Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 18:54

General

  • Target

    1f5ce1bd1c533fcc0066c163f6c20cb6.exe

  • Size

    1.4MB

  • MD5

    1f5ce1bd1c533fcc0066c163f6c20cb6

  • SHA1

    a24888d4981a1c75e94a0c3c5aa3031b5be9661f

  • SHA256

    7e261cab7138dfb36685688d9c251b058673fc090d5de5348a537183ebecea3e

  • SHA512

    1afb9d321709ca52d6316eab988dc19c5c3b2d85d1400f5783b48878bb4a8098ffc6d21c0c2bb63e96c0d4e872df2542c3204defd6defea490840613ce4c62a5

  • SSDEEP

    24576:bq+rq91IdRTkPoHznHVmn7swrOZgtyjB/VKuq37Do9UGIwN59:P41xhhr8Wuq37Do9UGIuT

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f5ce1bd1c533fcc0066c163f6c20cb6.exe
    "C:\Users\Admin\AppData\Local\Temp\1f5ce1bd1c533fcc0066c163f6c20cb6.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3044

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3044-0-0x0000000000CD0000-0x0000000000E38000-memory.dmp

          Filesize

          1.4MB

        • memory/3044-1-0x000007FEF59A0000-0x000007FEF638C000-memory.dmp

          Filesize

          9.9MB

        • memory/3044-2-0x000000001BD30000-0x000000001BDB0000-memory.dmp

          Filesize

          512KB

        • memory/3044-3-0x000007FEF59A0000-0x000007FEF638C000-memory.dmp

          Filesize

          9.9MB