Analysis

  • max time kernel
    29s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2023, 07:33

General

  • Target

    19405bbcd7971d9f614981e62efc112b0d34d14db082f51ad7dd6a40734898eb.exe

  • Size

    5.9MB

  • MD5

    555d9b45cbea287dada7587dc6c3b74e

  • SHA1

    5af61bf375dc5dd9dece971df5af908e43c295f6

  • SHA256

    19405bbcd7971d9f614981e62efc112b0d34d14db082f51ad7dd6a40734898eb

  • SHA512

    de643ac222258a5e3ed6f17ea31ed27fd7fa2f30cb54918f815908e54d5650b8624345a8431143509bfdc2673e72257c29617bf23a4efe55a1cfdc2b14c0909f

  • SSDEEP

    98304:V5QEMSQfz2I+3azy/0Rzg6WN31K4spP7nbw:up2Iwaz9Rzto31KNpHw

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19405bbcd7971d9f614981e62efc112b0d34d14db082f51ad7dd6a40734898eb.exe
    "C:\Users\Admin\AppData\Local\Temp\19405bbcd7971d9f614981e62efc112b0d34d14db082f51ad7dd6a40734898eb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1960

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads