Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2023, 08:37

General

  • Target

    f48550bb0408a221fe5bb917f13ce33a462d49781c5ea710fa28e929c76343ea.exe

  • Size

    3.8MB

  • MD5

    1690e6198af641c34eb7aaffa0c2755d

  • SHA1

    e85973c5808fed8262c5d522008402ee7720d6a3

  • SHA256

    f48550bb0408a221fe5bb917f13ce33a462d49781c5ea710fa28e929c76343ea

  • SHA512

    23eb11eacac06dccc67920f06e62012649913e6a682567e0102a7d810839310c3662e5becc18cf28af418798243b89e24bf7e871cf6747f6c141d866d749e50a

  • SSDEEP

    49152:0Hgl8qksDKUZ6tXTCMWgxCMNstgAJoZjui1ZaI5kLLomZFHhp9v1Io3h0TN3pvkj:+dZxCM1VZ6i17uLoYe3pG

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f48550bb0408a221fe5bb917f13ce33a462d49781c5ea710fa28e929c76343ea.exe
    "C:\Users\Admin\AppData\Local\Temp\f48550bb0408a221fe5bb917f13ce33a462d49781c5ea710fa28e929c76343ea.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1708

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1708-54-0x0000000180000000-0x0000000180032000-memory.dmp

          Filesize

          200KB

        • memory/1708-55-0x0000000180000000-0x0000000180032000-memory.dmp

          Filesize

          200KB

        • memory/1708-56-0x0000000180000000-0x0000000180032000-memory.dmp

          Filesize

          200KB