Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2023 12:29

General

  • Target

    Pcnqrjifee.exe

  • Size

    174KB

  • MD5

    f1de5b4304d2e4bd2f0ceb1eec386cf6

  • SHA1

    64bbcbfa304ea0b448e8e0491071c731e3afef90

  • SHA256

    ffb3e100fc9496efcd741c1938b4bd1218601ca189bd7507cc2543e022d6c1da

  • SHA512

    73bce5106f87139def09c14ef82e3f07e653ceddf5b0d6430d2af24f678c03bcf1b27b81b37c5c1f77ff5488e2930795a2aed240e9020c2938ee9d5eee0d7c87

  • SSDEEP

    3072:98xlpX3W5ObFn1R32Ucyyv/HERzBRdED9SaP29htKudG4M:glpX7jJ2xfEJBRdED9JQtJ

Score
6/10

Malware Config

Signatures

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Pcnqrjifee.exe
    "C:\Users\Admin\AppData\Local\Temp\Pcnqrjifee.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2876-0-0x0000000001020000-0x0000000001050000-memory.dmp

    Filesize

    192KB

  • memory/2876-1-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2876-2-0x00000000047F0000-0x0000000004830000-memory.dmp

    Filesize

    256KB

  • memory/2876-3-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2876-4-0x00000000047F0000-0x0000000004830000-memory.dmp

    Filesize

    256KB