Analysis

  • max time kernel
    26s
  • max time network
    29s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    26-04-2023 17:24

General

  • Target

    MsgBox.exe

  • Size

    4KB

  • MD5

    798245e360f6ab00125f5872d2859315

  • SHA1

    7e9166020e255dea5234fa53817d6a1f036d8cd8

  • SHA256

    b4eb2e08182337ce208c606efa068b6d91bc9576e0755e58788054496af9510a

  • SHA512

    019a750a41d0c25b343b6b289c045c4c00a4851463251ee9368f52f93baba4df560dd96c11a343884b6b918897ca124af2c4af8908afc5e33df898d94eb02388

  • SSDEEP

    48:6IBn61h1nkAUZZF7iotBNM9/eXGx1i+UZsFtoqlThp5sFWpfbNtm:361vnSZZxRZWLfn3fzNt

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MsgBox.exe
    "C:\Users\Admin\AppData\Local\Temp\MsgBox.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1972

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1972-54-0x0000000000370000-0x0000000000378000-memory.dmp

    Filesize

    32KB