Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    20-07-2023 14:46

General

  • Target

    f4f147d270e98a7598f02362ddd2f927.exe

  • Size

    3.1MB

  • MD5

    f4f147d270e98a7598f02362ddd2f927

  • SHA1

    c79df640b839d8fb01ede7d91c397212a3e1da0c

  • SHA256

    d0130399fd404226ae5b90897e8e3affe29b7d34081ee1bf11ecb3750ca342c5

  • SHA512

    519bf57ec999ef477b0d16af2eac6beefd2e2e50f491163f327919aa759b2aa10d0adf8e9ee23c8838cbcbb018e96943dd118b1660ecfdb41601689e1b57ff99

  • SSDEEP

    98304:FRyJKKbIFlOLLN3z71neq1VKj7J2tB5pu:FkwKbqeJ171Yj7Ep

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4f147d270e98a7598f02362ddd2f927.exe
    "C:\Users\Admin\AppData\Local\Temp\f4f147d270e98a7598f02362ddd2f927.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2268

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2268-53-0x0000000001380000-0x00000000016A0000-memory.dmp

    Filesize

    3.1MB

  • memory/2268-54-0x00000000749D0000-0x00000000750BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2268-55-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB

  • memory/2268-56-0x00000000749D0000-0x00000000750BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2268-57-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB