Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    05-10-2023 03:48

General

  • Target

    Inquiry Parts 2023-10.scr

  • Size

    769KB

  • MD5

    5effabc97480cc8fb3cfa6833d20e5ef

  • SHA1

    168c4247f596a89f73b081b20e214a74feed0109

  • SHA256

    18984ef29316e8b0ca4423e4f17418b23ec54e91bb7809ea5f840d03b618d987

  • SHA512

    fa77e8e1e805a98e46773b3a2b2301bff80134bfb764d8cc4b1b1563ec3ab964a82ae519582288c5f9e556d0964ae9c1c8c50c5d564be6581dc5091f757eb6bd

  • SSDEEP

    12288:CRvAblxM/xBzcFyHcJNdWfpuL19aoI+39k68:CRYbnM/Xzc3Nmpaz++h8

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Inquiry Parts 2023-10.scr
    "C:\Users\Admin\AppData\Local\Temp\Inquiry Parts 2023-10.scr" /S
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2200

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2200-0-0x00000000003C0000-0x0000000000484000-memory.dmp

    Filesize

    784KB

  • memory/2200-1-0x000007FEF5DD0000-0x000007FEF67BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2200-2-0x000000001BA40000-0x000000001BAC0000-memory.dmp

    Filesize

    512KB

  • memory/2200-3-0x0000000000360000-0x0000000000368000-memory.dmp

    Filesize

    32KB

  • memory/2200-4-0x000007FEF5DD0000-0x000007FEF67BC000-memory.dmp

    Filesize

    9.9MB

  • memory/2200-5-0x000000001BA40000-0x000000001BAC0000-memory.dmp

    Filesize

    512KB