Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    13/03/2023, 15:43

General

  • Target

    Advanced Payment Copy.exe

  • Size

    283KB

  • MD5

    09409a080e319319e27445d6ae979715

  • SHA1

    c4d53e4f165e9341b5562594abd995d808c90bfb

  • SHA256

    a7496f64d8f6fedf5d7684e9b073afc39f7f0254ca3a35de6383445a9235329e

  • SHA512

    3a044a2a6dad21e8342c51fa82ea96022a748e142af034d9d73f59eaa47d5e0e986aa0db3369ae8cf4a22e517a4df849680baa68862b907b8c3ea108835cc5ec

  • SSDEEP

    6144:WuI5B5zVJAiZneXOuGpM1O27hDT9dCgebj/:WuI5B5zVJAiZneXOuvVfG

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Advanced Payment Copy.exe
    "C:\Users\Admin\AppData\Local\Temp\Advanced Payment Copy.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1160

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1160-54-0x0000000000820000-0x000000000086C000-memory.dmp

    Filesize

    304KB

  • memory/1160-55-0x000000001AC90000-0x000000001AD10000-memory.dmp

    Filesize

    512KB

  • memory/1160-56-0x000000001AC90000-0x000000001AD10000-memory.dmp

    Filesize

    512KB