Analysis

  • max time kernel
    151s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 07:00

General

  • Target

    cda9cb09c2754dbf03a34bc88ff6c69d55a7fc5e80b293048b635220c15011f6.exe

  • Size

    16KB

  • MD5

    53dec821399851d312b24f34b58b138a

  • SHA1

    209ebdce938b67f9796d546520cd8c5323dbe4fa

  • SHA256

    cda9cb09c2754dbf03a34bc88ff6c69d55a7fc5e80b293048b635220c15011f6

  • SHA512

    b25f9b23bd27043f92e1a02fc3df2770279c98aa9f13f45b254b0d06a6a0f671c2c65de7b5fd25ba852cd188a50352fe16ecafd1e7e0f8fc7ee3a9c6e6615fc5

  • SSDEEP

    192:kRXrvuFxuXMh5NMTDNuXVCDrnnLbxvoR/romQp3177T5F/EC7SI0qOvvv+Keh0/0:mWu87NoUEHnP9WQr7/0Iy3+pys

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cda9cb09c2754dbf03a34bc88ff6c69d55a7fc5e80b293048b635220c15011f6.exe
    "C:\Users\Admin\AppData\Local\Temp\cda9cb09c2754dbf03a34bc88ff6c69d55a7fc5e80b293048b635220c15011f6.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/552-54-0x0000000075131000-0x0000000075133000-memory.dmp

    Filesize

    8KB