Analysis

  • max time kernel
    38s
  • max time network
    202s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 14:55

General

  • Target

    146f8a2317c28254b68d2dcda276af86f74af48f93b042bc0dfb9e51c0767149.exe

  • Size

    499KB

  • MD5

    b3d6093328b01eafd168ea55a28b39c8

  • SHA1

    2041e67c480b7a5d32183db73214a76b2ec85ec7

  • SHA256

    146f8a2317c28254b68d2dcda276af86f74af48f93b042bc0dfb9e51c0767149

  • SHA512

    6771a9dcc7bec4cc03917158f815acfa184d5291017be52fbaf21f6175e5901b7c93fa206b1183492423c5051f82fbddcb9c8be2a494df7be43713b152bdb32d

  • SSDEEP

    6144:ZTmDluhJ8UrxHEFz5jS3GXmyD7JELr8wdmR6DER0u+GIIIIIIIhIIIIIIIIIIII4:ZTmYf8Urx0U3Gt7JHwdmJm5Y

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\146f8a2317c28254b68d2dcda276af86f74af48f93b042bc0dfb9e51c0767149.exe
    "C:\Users\Admin\AppData\Local\Temp\146f8a2317c28254b68d2dcda276af86f74af48f93b042bc0dfb9e51c0767149.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2040-54-0x0000000000890000-0x0000000000912000-memory.dmp

    Filesize

    520KB

  • memory/2040-55-0x0000000000430000-0x0000000000468000-memory.dmp

    Filesize

    224KB

  • memory/2040-56-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/2040-57-0x00000000761E1000-0x00000000761E3000-memory.dmp

    Filesize

    8KB