Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2023 13:00

General

  • Target

    370d6aac8828123365d71451f9fa0edd.exe

  • Size

    6.8MB

  • MD5

    370d6aac8828123365d71451f9fa0edd

  • SHA1

    dcb058b076d11075c0ef5ba37f18fe8b81ec12d7

  • SHA256

    11edfe5e9ad2c51bd7c66245e05bb5b05ec4207c0bea0715e8b47cfd924bc268

  • SHA512

    c3af18df345d057c7e2e1248bdfe63724595fb7d9e0fd90cd0879e7ec3f2e3531f2c97d22723bc14b4eaaa88e67756176546bfbe0d6164856f6d0b79dc7f8266

  • SSDEEP

    98304:2F284x5EH1MI06vaE1f9jWsm+gI1tI5hhTzFN484CiOxVduLPTP:2k84jIP1f/mh/hf484CiOx0D

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\370d6aac8828123365d71451f9fa0edd.exe
    "C:\Users\Admin\AppData\Local\Temp\370d6aac8828123365d71451f9fa0edd.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1736-0-0x000000001E000000-0x000000001E391000-memory.dmp

    Filesize

    3.6MB

  • memory/1736-6-0x000000001D1A0000-0x000000001D1C1000-memory.dmp

    Filesize

    132KB

  • memory/1736-12-0x000000001D170000-0x000000001D18A000-memory.dmp

    Filesize

    104KB

  • memory/1736-18-0x0000000180000000-0x0000000180042000-memory.dmp

    Filesize

    264KB

  • memory/1736-24-0x0000000002A70000-0x0000000002A85000-memory.dmp

    Filesize

    84KB

  • memory/1736-30-0x000000001D110000-0x000000001D11A000-memory.dmp

    Filesize

    40KB