Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 04:09

General

  • Target

    Fnjnpedy.exe

  • Size

    32KB

  • MD5

    61a347aa80bae20fc5908ae86f8790ad

  • SHA1

    2163cacdcb0b91e2a4c4cb2e2e021d6148961854

  • SHA256

    41ccb4c165200571b2d10047d7e25c85e7a270c2bb6c3438c7f8edce7dc2fc9c

  • SHA512

    e1cfd42004c0c1c32af49632769ba84dd93c128e210ced9f47fffbbd3f1324885e4d830b90432c83082c17c44ada91878c33585bdd5cb27c3b47486ae9ecd30c

  • SSDEEP

    384:LzsL/CyUCVnCMr2jEKqv++7Jk+qY/sgKwLF12APL6yRqtxAx+roEOPVK/KO+zB6a:aUCVCMrJJd5pRKs3RqtGx+roLYP+ka

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fnjnpedy.exe
    "C:\Users\Admin\AppData\Local\Temp\Fnjnpedy.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2172-0-0x0000000000FF0000-0x0000000000FFE000-memory.dmp

    Filesize

    56KB

  • memory/2172-1-0x000007FEF5200000-0x000007FEF5BEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2172-2-0x000000001BFB0000-0x000000001C030000-memory.dmp

    Filesize

    512KB

  • memory/2172-3-0x000007FEF5200000-0x000007FEF5BEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2172-4-0x000000001BFB0000-0x000000001C030000-memory.dmp

    Filesize

    512KB