Analysis

  • max time kernel
    117s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 20:23

General

  • Target

    547e11b0f41bbe4635692c24c1896b08.exe

  • Size

    29.0MB

  • MD5

    547e11b0f41bbe4635692c24c1896b08

  • SHA1

    2231b6346cb9b9720d37419053d9358ab1c60225

  • SHA256

    502e2f32013509074ad2bf97b6b354c9ff6ac48774042d162586a81c2bb34a8c

  • SHA512

    dd9e76f52c27c7f5940e58a8ea1b16ba7f4ca8127b3cbecf90aa1b2d105d4bf551d758c961d2face91ad618c1968fd7b71093cf46ef627e4ca014b24b34e0bc2

  • SSDEEP

    786432:eT1WyWZzCFiqcSmLjlm3DBXT9OpMIt/+uuTBF4njKmoIaXgawe:61RMCFiqZW0F9OozF4CgY

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\547e11b0f41bbe4635692c24c1896b08.exe
    "C:\Users\Admin\AppData\Local\Temp\547e11b0f41bbe4635692c24c1896b08.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2204

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BaoFengDefaultBdSetup.xml

    Filesize

    61B

    MD5

    21b3a63c555ebc90020712334d6d021a

    SHA1

    7b51092191e711e281b322e19315fe945dbe5052

    SHA256

    a3fffe5d7052cbbaf6c941b55a353f648b6541279b68a1a71d62e70e8583a6d3

    SHA512

    80fe00ca8fbfdd59d4ff25c32b8ec9d97085cebf27e060dda1b2be5e18d39851331e985c3ee13b12a324a9ab5a642197000ed164060cba8bdd563abc783eaf0c

  • memory/2204-0-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/2204-214-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB