Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2023 19:29

General

  • Target

    c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe

  • Size

    754KB

  • MD5

    0b85d0466bdc1272b82f2168d19fd2f9

  • SHA1

    59e5fd69df55b8119f00f339cc291e8021d6c9e8

  • SHA256

    c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152

  • SHA512

    104189a37f741bbc5bca9a84139a2e60eb93aa3416e0246741aea405c44dafa31c4b05e9b9c43bbf2472d071b9f9c905a8dc8765577ef515436c1ffa14a7fd40

  • SSDEEP

    12288:RTnueH5qlyMP6sEvkRT8Zbb+rUL3H7ilvK3ZUz6VcwwlNVbxfnj+7IPG:RVqlYlk989Am7EK3ZHVuNr7U

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
    "C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
      "C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"
      2⤵
        PID:2236
      • C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
        "C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"
        2⤵
          PID:2760
        • C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
          "C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"
          2⤵
            PID:2692
          • C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
            "C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"
            2⤵
              PID:1400
            • C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
              "C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"
              2⤵
                PID:2272

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/2512-0-0x0000000000170000-0x0000000000232000-memory.dmp

              Filesize

              776KB

            • memory/2512-1-0x0000000074700000-0x0000000074DEE000-memory.dmp

              Filesize

              6.9MB

            • memory/2512-2-0x0000000004B50000-0x0000000004B90000-memory.dmp

              Filesize

              256KB

            • memory/2512-3-0x0000000000740000-0x000000000075A000-memory.dmp

              Filesize

              104KB

            • memory/2512-5-0x00000000006B0000-0x00000000006BA000-memory.dmp

              Filesize

              40KB

            • memory/2512-4-0x00000000004E0000-0x00000000004E8000-memory.dmp

              Filesize

              32KB

            • memory/2512-6-0x0000000005020000-0x000000000509C000-memory.dmp

              Filesize

              496KB

            • memory/2512-7-0x0000000074700000-0x0000000074DEE000-memory.dmp

              Filesize

              6.9MB