Analysis

  • max time kernel
    20s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 13:17

General

  • Target

    21237fc58ff4349220b988d176cef82a.exe

  • Size

    108KB

  • MD5

    21237fc58ff4349220b988d176cef82a

  • SHA1

    f4ff99d185bb67ff61a3f34f113f1f96b08048a8

  • SHA256

    46d6cf75f3fd0e2689c0b66730da33ff592e2d4c12e0bbdb988c5196ea5368ba

  • SHA512

    31d8eb32d8729644aa8afde8bb6ec221ee84e471319f49717040042558574bc6baf2e57058ccc6bd683efb97d93b480f1a25d02d007810daaa85e07c60c6efbe

  • SSDEEP

    1536:1bSqZVJdThUxmskJJw73xehCbRfQZvZgWhbv9G9DKKlVCBXI/tmjalomuRF:1bLpZuEskJ4xSCFfav+qbA34Bultuv

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21237fc58ff4349220b988d176cef82a.exe
    "C:\Users\Admin\AppData\Local\Temp\21237fc58ff4349220b988d176cef82a.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2672-0-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2672-1-0x0000000000240000-0x000000000027D000-memory.dmp

    Filesize

    244KB

  • memory/2672-2-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/2672-3-0x0000000000240000-0x000000000024D000-memory.dmp

    Filesize

    52KB