Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230703-en
  • resource tags

    arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system
  • submitted
    07-07-2023 07:26

General

  • Target

    DOC13161720230705091725.exe

  • Size

    44KB

  • MD5

    867251b45427c9c32a767b1fa8fbdd17

  • SHA1

    f3fd541cd69d09b301c7d5c2770d2fab98fb3d36

  • SHA256

    4a61cb1c1eedce4c2c9eed252e2c19497761337b40afaabb7585adfc1d273915

  • SHA512

    26ab8808de16273ea60860337f156e81ac8845aa85ca9748551f628d8e9ec12d127ec4ae0b22fd6e2507597e2b6658e735ecca8b8a11f453ccce30d332950410

  • SSDEEP

    768:tkkPfnjbxZkypwqxStQV81v8lLrEjRU4fXD0kpwY8q:fnnjAydSWV81vuLAjq4fDdpwFq

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DOC13161720230705091725.exe
    "C:\Users\Admin\AppData\Local\Temp\DOC13161720230705091725.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:276

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/276-54-0x0000000000FB0000-0x0000000000FC0000-memory.dmp

    Filesize

    64KB

  • memory/276-55-0x0000000000F60000-0x0000000000FA0000-memory.dmp

    Filesize

    256KB

  • memory/276-56-0x0000000000F60000-0x0000000000FA0000-memory.dmp

    Filesize

    256KB