Analysis

  • max time kernel
    45s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 15:52

General

  • Target

    cf95178164257fb43b4c3dd62a06b81ffe01866a44ee812ee2be2d4fa45e653f.exe

  • Size

    638KB

  • MD5

    5f7e77c8bb1dc52968ebc0017a4def40

  • SHA1

    b4e7ca5283fc2007ed7cf3c22d113ec124c850d2

  • SHA256

    cf95178164257fb43b4c3dd62a06b81ffe01866a44ee812ee2be2d4fa45e653f

  • SHA512

    9e17b482184325318a0a2128e75d6c7096c95be3db4a58fae836f250f8f8c8bf0d5ff8f9595035579be613ab222107648befbfbf899206355fe131333fe6fd9d

  • SSDEEP

    12288:3vbAFUegnLnOrSMFyHrOud2Im/7YPnA0Hvc47MAgwaElnH5hX:3vbBnnOtYOIm/0AyHMAVX

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf95178164257fb43b4c3dd62a06b81ffe01866a44ee812ee2be2d4fa45e653f.exe
    "C:\Users\Admin\AppData\Local\Temp\cf95178164257fb43b4c3dd62a06b81ffe01866a44ee812ee2be2d4fa45e653f.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1848

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1848-54-0x0000000076091000-0x0000000076093000-memory.dmp

    Filesize

    8KB

  • memory/1848-55-0x0000000001000000-0x0000000001267000-memory.dmp

    Filesize

    2.4MB