Analysis

  • max time kernel
    54s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 17:21

General

  • Target

    e410c4b80aec7d583d1e1fdab7072cc0047aa0ebd433df8a356b57c22ca8d0af.exe

  • Size

    685KB

  • MD5

    bdc4a8ef0f9adbd1253b48aba70167ae

  • SHA1

    6b081505de57ec8668ce7b63873510b1f024551a

  • SHA256

    e410c4b80aec7d583d1e1fdab7072cc0047aa0ebd433df8a356b57c22ca8d0af

  • SHA512

    a62c68896d885e0aed2821b26133358b082289151f04f069507f021eb34876e760f1d9ac9a1ffdf03511735845a187a5fd775216b7dedb15eeb2a47efef9e930

  • SSDEEP

    12288:5KsrW5aEx8uX+TJ8tXYk4dHct2CAKsw1UBKhm2m+dLPwe4gMSGEj0xLpUk:AsrI8uAXZct2zKtUBKAn+LPwePGV

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e410c4b80aec7d583d1e1fdab7072cc0047aa0ebd433df8a356b57c22ca8d0af.exe
    "C:\Users\Admin\AppData\Local\Temp\e410c4b80aec7d583d1e1fdab7072cc0047aa0ebd433df8a356b57c22ca8d0af.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1248

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1248-54-0x0000000000BA0000-0x0000000000C50000-memory.dmp
    Filesize

    704KB

  • memory/1248-55-0x000000001AEC0000-0x000000001AF9E000-memory.dmp
    Filesize

    888KB

  • memory/1248-56-0x0000000000240000-0x0000000000246000-memory.dmp
    Filesize

    24KB

  • memory/1248-57-0x000000001B206000-0x000000001B225000-memory.dmp
    Filesize

    124KB

  • memory/1248-58-0x0000000000260000-0x000000000026A000-memory.dmp
    Filesize

    40KB

  • memory/1248-59-0x000000001B206000-0x000000001B225000-memory.dmp
    Filesize

    124KB

  • memory/1248-60-0x0000000000260000-0x000000000026A000-memory.dmp
    Filesize

    40KB

  • memory/1248-61-0x000000001B206000-0x000000001B225000-memory.dmp
    Filesize

    124KB