Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/12/2022, 00:01

General

  • Target

    a4cca8be68fe0baa508482c51dec9cc9cc3c75ba5715696d3d4ba181a0a0b8a5.exe

  • Size

    26KB

  • MD5

    9813ca134cfb965866a3ce0d829d9046

  • SHA1

    53b9fe54e822fb6a72740973530e3b5f19caec8b

  • SHA256

    a4cca8be68fe0baa508482c51dec9cc9cc3c75ba5715696d3d4ba181a0a0b8a5

  • SHA512

    3149cd97a7b1c04fd2e2c56ec2d66b8be6e55211069b40501a8548ab3f2312542b5c55d49086430d74c6a8e240cdc146c77221d987b42b20870eed73c244f007

  • SSDEEP

    384:YVUy9/76H1kbA+Ihcsop64oAxaZaXwceoysVUyx+FodPEILwCk2ftrs7Js5vbX:YVUy9WHeENl+oAY6jzVUysGcekisY

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4cca8be68fe0baa508482c51dec9cc9cc3c75ba5715696d3d4ba181a0a0b8a5.exe
    "C:\Users\Admin\AppData\Local\Temp\a4cca8be68fe0baa508482c51dec9cc9cc3c75ba5715696d3d4ba181a0a0b8a5.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/768-54-0x0000000076871000-0x0000000076873000-memory.dmp

    Filesize

    8KB