Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2023, 22:45

General

  • Target

    file.exe

  • Size

    2.4MB

  • MD5

    474bb663d4f4f856f25c9c9e3776afdc

  • SHA1

    20d9cd25b32f86c608afa2772f886a74fb415e36

  • SHA256

    52561ff3d9b1ecac75cbdfb406992f710551148dd79ee5e5370efde2e9cdfa82

  • SHA512

    715fd3df4092d80d72f35e6989f6581f53d51bf431281a8829934d8ef11629fcb188c13cb6d5fc5d0fa939bdb0be5c2df303a85c244ec5a8d82bd0faf0f14333

  • SSDEEP

    24576:igqpa9/1wCcJ+VzJMdtz7v7xEvhGJZKJnEqSK73o8x3lmclSWQwWd8y5x:igqyVz0hlEKitcclSvwWW2

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2756

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2756-0-0x0000000000B10000-0x0000000000D82000-memory.dmp

    Filesize

    2.4MB

  • memory/2756-1-0x000007FEF5C30000-0x000007FEF661C000-memory.dmp

    Filesize

    9.9MB

  • memory/2756-2-0x000000001B9A0000-0x000000001BA20000-memory.dmp

    Filesize

    512KB

  • memory/2756-3-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2756-4-0x000007FEF5C30000-0x000007FEF661C000-memory.dmp

    Filesize

    9.9MB