Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 02:05

General

  • Target

    4b6f0c598bc39337732c5aec11fef481.exe

  • Size

    345KB

  • MD5

    4b6f0c598bc39337732c5aec11fef481

  • SHA1

    975436aad63fb6ac2dfc74c340c0c28bd32c289a

  • SHA256

    135c149de0ab56d7c5f38fecb71bc3f516a3112a61edaf0865ce5b9b711015f1

  • SHA512

    184808af94a8d03ed8c7d1c20c3fc704fc4c80f601abeb1124dd7a703e260edb0ff171ce73a866baeb09188b4f18273ac97dcffc9666437675af6be4992445ed

  • SSDEEP

    6144:6ujgdRI/91IkY5G68DYo1HI4Sdj696ToC9tVDVWQ7YeTBZO0RQEdXP0c:6BdRIFAGlDY2SkKr7YeTzBNPv

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b6f0c598bc39337732c5aec11fef481.exe
    "C:\Users\Admin\AppData\Local\Temp\4b6f0c598bc39337732c5aec11fef481.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2448

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads