Analysis

  • max time kernel
    213s
  • max time network
    332s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2022, 21:28

General

  • Target

    6ac531df0eb8e4156132a607d39d980991c8ae900dc1ccb0a6697d34e111dbcc.exe

  • Size

    5KB

  • MD5

    2cc737c0f9bd47482a51b5006682c070

  • SHA1

    e3c4410946ef5a480a092cf94d7731da4ea55f5c

  • SHA256

    6ac531df0eb8e4156132a607d39d980991c8ae900dc1ccb0a6697d34e111dbcc

  • SHA512

    fa6b4a2c6502faded55c55071abbe125dcdc9cba7ced23a4eb49955c3801d87a1fe6c8762a0722569f8ff5a6400d198d4961eee84f4225dc5a8ace5d6e0875c8

  • SSDEEP

    48:6QWugsAfx5uMvDpsTqDc0CuITXRniSPzIeZvIzXOexuultnxBoqXSfbNtm:UuQfyiDc00iSPxBIzXDPxizNt

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ac531df0eb8e4156132a607d39d980991c8ae900dc1ccb0a6697d34e111dbcc.exe
    "C:\Users\Admin\AppData\Local\Temp\6ac531df0eb8e4156132a607d39d980991c8ae900dc1ccb0a6697d34e111dbcc.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/672-54-0x0000000000AC0000-0x0000000000AC8000-memory.dmp

    Filesize

    32KB