Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2023, 02:00

General

  • Target

    1.exe

  • Size

    993KB

  • MD5

    73bdb319f41bd9ebdbcbe68e66e8f991

  • SHA1

    a8cd09dedf4d4dadea5006dde791483b2ecd33f0

  • SHA256

    7c1a0a68549a85818c104f8ea234e86dcda82e8594a27dfb09fd4df2893d63e2

  • SHA512

    5c05239d91811e66f86d07debbaa9f1d00705f7c0d2382c079327f1cdce0f77376d260bb94007c245c05d0694978beb0f9d3631580fffbbcbf1c51a056dfaf48

  • SSDEEP

    6144:J01aH0b/jE25EctbrQcAKMRUOUqN+0sE6I9raFU4t9nF20bK4rLxVq6:J01M0b/jb5lQmMRrNL6e4TFbe6

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2192

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2192-0-0x000007FEF5130000-0x000007FEF5ACD000-memory.dmp

    Filesize

    9.6MB

  • memory/2192-1-0x0000000000A60000-0x0000000000AE0000-memory.dmp

    Filesize

    512KB

  • memory/2192-2-0x000007FEF5130000-0x000007FEF5ACD000-memory.dmp

    Filesize

    9.6MB

  • memory/2192-3-0x0000000000A60000-0x0000000000AE0000-memory.dmp

    Filesize

    512KB

  • memory/2192-4-0x0000000000A60000-0x0000000000AE0000-memory.dmp

    Filesize

    512KB

  • memory/2192-5-0x000007FEF5130000-0x000007FEF5ACD000-memory.dmp

    Filesize

    9.6MB

  • memory/2192-6-0x0000000000A60000-0x0000000000AE0000-memory.dmp

    Filesize

    512KB

  • memory/2192-7-0x0000000000A60000-0x0000000000AE0000-memory.dmp

    Filesize

    512KB