Analysis

  • max time kernel
    88s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 02:52

General

  • Target

    4dfe10b29b0ed37561c67b9600d2f297.exe

  • Size

    124KB

  • MD5

    4dfe10b29b0ed37561c67b9600d2f297

  • SHA1

    49555dc25fd55b659a25aa4246dffaabbb40111a

  • SHA256

    3e72816a9d02aa5362b7c847715c8cc51a7599add9c00c36b71b4273583eedff

  • SHA512

    c6f19bebf9c08a3991c998fcba35c0be73ed491d4ca018f913354ca63021a48a2fc7ff9d966a2291cade6c86ac8f8a56face83f2b774241efc3c11c039d21bdd

  • SSDEEP

    1536:AGUyoXNP0YiEoyTol4XDL0iXd3ox3mIlpJ4Cd4wFsM2bPc9BTQC:4yoXNPTYA4kd3oplddSM2Pc91X

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4dfe10b29b0ed37561c67b9600d2f297.exe
    "C:\Users\Admin\AppData\Local\Temp\4dfe10b29b0ed37561c67b9600d2f297.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1812

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads