Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02-10-2023 08:19

General

  • Target

    Webxinfy.exe

  • Size

    424KB

  • MD5

    aef95313f585ac4fcf3fd9b6c489b286

  • SHA1

    d0d887a33c18e6b70f4e37fbc0e1a384b33b476c

  • SHA256

    b3dba4262136858ea1c87d1aca82830267af72efb7f509faa21dddcec066bc89

  • SHA512

    97586a81524469fdb2d49778006a7b6d42b14a871e9b346572551374692fe55ce16337240aacbacb90ea3dca0dd993e96a4303be5f037cb72df00d97f2b93704

  • SSDEEP

    6144:gVBZhKsN6+zRDQSsFv9CK5uj2rUHBwK67AfsOgy2tCeYYHrMEzvwe/vy3VXB1:gFhTOllCKsj2njAfsOgtzvZWV7

Score
6/10

Malware Config

Signatures

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Webxinfy.exe
    "C:\Users\Admin\AppData\Local\Temp\Webxinfy.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1884-0-0x00000000003C0000-0x000000000042E000-memory.dmp

    Filesize

    440KB

  • memory/1884-1-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

    Filesize

    9.9MB

  • memory/1884-2-0x000000001BCA0000-0x000000001BD20000-memory.dmp

    Filesize

    512KB

  • memory/1884-3-0x0000000000370000-0x0000000000376000-memory.dmp

    Filesize

    24KB

  • memory/1884-4-0x000007FEF5990000-0x000007FEF637C000-memory.dmp

    Filesize

    9.9MB

  • memory/1884-5-0x000000001BCA0000-0x000000001BD20000-memory.dmp

    Filesize

    512KB