Analysis

  • max time kernel
    98s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 04:21

General

  • Target

    897fe2619452db001d22a3be7e710979158b6a581ef30fb9b5b72c552b93e40e.exe

  • Size

    678KB

  • MD5

    579fd63b2b2e8c4e7dffed52b6f16f0e

  • SHA1

    532074a0e7c56542f0fc1d900862fe685ca61069

  • SHA256

    897fe2619452db001d22a3be7e710979158b6a581ef30fb9b5b72c552b93e40e

  • SHA512

    f9390b225d9299d0aa94d43050e31232457a57e8de98c1c84a7c927b5d0d58b56b4d43b3f65a833fabe641d44e69e8ff2ecce2ce51b11ad87ea636b6be0bef69

  • SSDEEP

    12288:k67xULscYJRxxc5YOwRBNnclcQ0NozXps0WFq:T7xiWR5jQcQ0NozXps0W

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\897fe2619452db001d22a3be7e710979158b6a581ef30fb9b5b72c552b93e40e.exe
    "C:\Users\Admin\AppData\Local\Temp\897fe2619452db001d22a3be7e710979158b6a581ef30fb9b5b72c552b93e40e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1500

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1500-54-0x0000000001170000-0x0000000001222000-memory.dmp

          Filesize

          712KB