Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 16:33

General

  • Target

    SecuriteInfo.com.Win32.DropperX-gen.276.10448.exe

  • Size

    6KB

  • MD5

    4568108633c246c348b7a6179f1eef10

  • SHA1

    622978f85eafdd79be410d47551c0098bd924400

  • SHA256

    3f999fa0a43425869e768d6ca75c3e5a70dd34e475cdd20ee240076c6ed75749

  • SHA512

    70933c4ec2a44e4ed4d17745c19d3282094e965b2b3327f76af2810f861e51aa7f98602d1467668bf6be449d11db03ff4ce528a407b559042e7a785eae910209

  • SSDEEP

    48:6LV5MbckIQXCIsN+nK/M1DIMAGd45hJpLOj4dd2xyiXii2qBHruul4dG7FWSfbNM:RckVaNd/KoGoJa4mhiNktGGFzNt

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.276.10448.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.276.10448.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1936-54-0x0000000000C10000-0x0000000000C18000-memory.dmp

    Filesize

    32KB

  • memory/1936-55-0x0000000076DC1000-0x0000000076DC3000-memory.dmp

    Filesize

    8KB