Analysis

  • max time kernel
    25s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 12:09

General

  • Target

    9736466434854307c446b25c56e0b60b08b319eab97e8e8084e039519cfe09fe.exe

  • Size

    1.5MB

  • MD5

    ecff0c25135ce18dad14294a184ee802

  • SHA1

    5478cbc7c287896a3033ac998d82e2c19934007f

  • SHA256

    9736466434854307c446b25c56e0b60b08b319eab97e8e8084e039519cfe09fe

  • SHA512

    6e58383de5e0bc9b75dd1c5eeb82c51c1b1fb8da9407255338ced32982e1ca1254bf06b3a514d0aabe41fe1b9f10f5902126c849429d1dc208ba6e0e567c9cf0

  • SSDEEP

    24576:0kbfuOCAl0oR4CbRW+wsDaQw6DDz3qRyPnmGfrnvVUKueY8RmneWtJNq3IVxq:0a2OC1U4easY6DwOBfrnvV7UeWt/qG4

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9736466434854307c446b25c56e0b60b08b319eab97e8e8084e039519cfe09fe.exe
    "C:\Users\Admin\AppData\Local\Temp\9736466434854307c446b25c56e0b60b08b319eab97e8e8084e039519cfe09fe.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    PID:1780

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\y4nvldh0.v5e\7z.dll

          Filesize

          893KB

          MD5

          04ad4b80880b32c94be8d0886482c774

          SHA1

          344faf61c3eb76f4a2fb6452e83ed16c9cce73e0

          SHA256

          a1e1d1f0fff4fcccfbdfa313f3bdfea4d3dfe2c2d9174a615bbc39a0a6929338

          SHA512

          3e3aaf01b769471b18126e443a721c9e9a0269e9f5e48d0a10251bc1ee309855bd71ede266caa6828b007359b21ba562c2a5a3469078760f564fb7bd43acabfb

        • \Users\Admin\AppData\Local\Temp\y4nvldh0.v5e\7z.dll

          Filesize

          893KB

          MD5

          04ad4b80880b32c94be8d0886482c774

          SHA1

          344faf61c3eb76f4a2fb6452e83ed16c9cce73e0

          SHA256

          a1e1d1f0fff4fcccfbdfa313f3bdfea4d3dfe2c2d9174a615bbc39a0a6929338

          SHA512

          3e3aaf01b769471b18126e443a721c9e9a0269e9f5e48d0a10251bc1ee309855bd71ede266caa6828b007359b21ba562c2a5a3469078760f564fb7bd43acabfb

        • \Users\Admin\AppData\Local\Temp\y4nvldh0.v5e\7z.dll

          Filesize

          893KB

          MD5

          04ad4b80880b32c94be8d0886482c774

          SHA1

          344faf61c3eb76f4a2fb6452e83ed16c9cce73e0

          SHA256

          a1e1d1f0fff4fcccfbdfa313f3bdfea4d3dfe2c2d9174a615bbc39a0a6929338

          SHA512

          3e3aaf01b769471b18126e443a721c9e9a0269e9f5e48d0a10251bc1ee309855bd71ede266caa6828b007359b21ba562c2a5a3469078760f564fb7bd43acabfb

        • memory/1780-54-0x0000000075A31000-0x0000000075A33000-memory.dmp

          Filesize

          8KB

        • memory/1780-56-0x0000000074170000-0x000000007471B000-memory.dmp

          Filesize

          5.7MB

        • memory/1780-59-0x0000000000C17000-0x0000000000C28000-memory.dmp

          Filesize

          68KB

        • memory/1780-60-0x0000000074170000-0x000000007471B000-memory.dmp

          Filesize

          5.7MB

        • memory/1780-61-0x0000000000C17000-0x0000000000C28000-memory.dmp

          Filesize

          68KB