Analysis

  • max time kernel
    152s
  • max time network
    210s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2022 03:00

General

  • Target

    a93c3a941ce7b78e11ab3ae3bc49be41afa5c32f34bec011a1030dd34a2fdc11.exe

  • Size

    17KB

  • MD5

    35032295e50f2420b7f32655d11f647c

  • SHA1

    960546e48b3fa35cb2bb61a3e1721ee6a41f71c4

  • SHA256

    a93c3a941ce7b78e11ab3ae3bc49be41afa5c32f34bec011a1030dd34a2fdc11

  • SHA512

    5d43c27641fc55a05b742fdc019eee4e5450f931283f78639662b5d081b6b3f2bc5cbeff48a0d9b97be5555287b7549b7617d071ed4a0ec938b14bf06d4b0d43

  • SSDEEP

    192:HN9NpVHQ0Hhg0MpJ6yO3wxieYZvoRgG1R3VHjgG3T8haLGQX90qkvv+Keh0/0:t9bde0UOAc9s1R5XqaaC9k3+pys

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a93c3a941ce7b78e11ab3ae3bc49be41afa5c32f34bec011a1030dd34a2fdc11.exe
    "C:\Users\Admin\AppData\Local\Temp\a93c3a941ce7b78e11ab3ae3bc49be41afa5c32f34bec011a1030dd34a2fdc11.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:764

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/764-54-0x0000000076651000-0x0000000076653000-memory.dmp

    Filesize

    8KB