Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2023, 14:09

General

  • Target

    2ced91764296c8a00371c6bbe417eeac91309bf1c18a3a9b4cedfe97a0cc6ef5.exe

  • Size

    13.7MB

  • MD5

    2f3bf6080571c5b07104aaaffa2186f1

  • SHA1

    97b5dedbeccd7a2f3f5227c7e01a42a79d419977

  • SHA256

    2ced91764296c8a00371c6bbe417eeac91309bf1c18a3a9b4cedfe97a0cc6ef5

  • SHA512

    bff1144b3295d0c5bdaf94bd847f1bad5d85854d9b69176230988bb0253f82fba41c5fd7e1e418ff7fe0051f006f1c545c6f1df62db6223f4c7c97cae2e524c6

  • SSDEEP

    393216:BpkxMjWhRH8EddHkAZtgSuPfEy6uPEYrkQGLdW:BpkxBEEd1kAZatn16uPEYop

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ced91764296c8a00371c6bbe417eeac91309bf1c18a3a9b4cedfe97a0cc6ef5.exe
    "C:\Users\Admin\AppData\Local\Temp\2ced91764296c8a00371c6bbe417eeac91309bf1c18a3a9b4cedfe97a0cc6ef5.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2680

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2680-0-0x0000000000400000-0x000000000048B000-memory.dmp

          Filesize

          556KB

        • memory/2680-1-0x0000000077690000-0x0000000077691000-memory.dmp

          Filesize

          4KB

        • memory/2680-2-0x0000000010000000-0x0000000010365000-memory.dmp

          Filesize

          3.4MB

        • memory/2680-9-0x00000000FFF90000-0x00000000FFFA5000-memory.dmp

          Filesize

          84KB

        • memory/2680-16-0x00000000FFF90000-0x00000000FFFA5000-memory.dmp

          Filesize

          84KB

        • memory/2680-21-0x00000000FFF80000-0x00000000FFF84000-memory.dmp

          Filesize

          16KB

        • memory/2680-24-0x00000000FFEA0000-0x00000000FFF7F000-memory.dmp

          Filesize

          892KB

        • memory/2680-30-0x00000000FFEA0000-0x00000000FFF7F000-memory.dmp

          Filesize

          892KB

        • memory/2680-37-0x00000000FFE80000-0x00000000FFE83000-memory.dmp

          Filesize

          12KB

        • memory/2680-34-0x00000000FFE90000-0x00000000FFE93000-memory.dmp

          Filesize

          12KB

        • memory/2680-40-0x00000000FFE70000-0x00000000FFE73000-memory.dmp

          Filesize

          12KB

        • memory/2680-43-0x00000000FFE60000-0x00000000FFE63000-memory.dmp

          Filesize

          12KB

        • memory/2680-46-0x00000000FFE50000-0x00000000FFE53000-memory.dmp

          Filesize

          12KB

        • memory/2680-49-0x00000000FFEA0000-0x00000000FFF7F000-memory.dmp

          Filesize

          892KB

        • memory/2680-50-0x00000000FFE40000-0x00000000FFE44000-memory.dmp

          Filesize

          16KB

        • memory/2680-53-0x00000000FFE30000-0x00000000FFE33000-memory.dmp

          Filesize

          12KB

        • memory/2680-56-0x00000000FFE20000-0x00000000FFE24000-memory.dmp

          Filesize

          16KB

        • memory/2680-59-0x00000000FFE10000-0x00000000FFE14000-memory.dmp

          Filesize

          16KB

        • memory/2680-62-0x00000000FFF90000-0x00000000FFFA5000-memory.dmp

          Filesize

          84KB

        • memory/2680-63-0x00000000FFE00000-0x00000000FFE05000-memory.dmp

          Filesize

          20KB

        • memory/2680-260-0x0000000000400000-0x000000000048B000-memory.dmp

          Filesize

          556KB