Analysis

  • max time kernel
    28s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2023, 03:59

General

  • Target

    f80fb68e43d64a69a23431326bd80179f0f3631962ab9ecc8ebb0e0354d105c7.exe

  • Size

    62KB

  • MD5

    f99422c66a010e0d293cc62ea636560c

  • SHA1

    195f2ce63f7d4aaf62d62fa85de027df10c28e7b

  • SHA256

    f80fb68e43d64a69a23431326bd80179f0f3631962ab9ecc8ebb0e0354d105c7

  • SHA512

    8f44b6b4893a1f35ccf1aa15411dbd7720d22b39e43576f71538e34fc21b1b866fa083940865bc541f5e6851332f0e929070bf3dd31ff68f4c19fc8a24dc3fef

  • SSDEEP

    768:cDVW5uhmv9//zzggwyx9rIrQwJYGMbAJAmQvmbAOjPQZIuySRAN:mks89DzKyrzwDMbAqbmMOjPE7m

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f80fb68e43d64a69a23431326bd80179f0f3631962ab9ecc8ebb0e0354d105c7.exe
    "C:\Users\Admin\AppData\Local\Temp\f80fb68e43d64a69a23431326bd80179f0f3631962ab9ecc8ebb0e0354d105c7.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/928-54-0x00000000012A0000-0x00000000012B6000-memory.dmp

    Filesize

    88KB

  • memory/928-55-0x0000000000420000-0x0000000000426000-memory.dmp

    Filesize

    24KB

  • memory/928-56-0x0000000004BE0000-0x0000000004C20000-memory.dmp

    Filesize

    256KB