Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2024 03:08

General

  • Target

    714978f7280e7927d34c8b6c4fc3b81d.exe

  • Size

    25KB

  • MD5

    714978f7280e7927d34c8b6c4fc3b81d

  • SHA1

    63a37d67c9bb7832c9c74d9d8a658fe58939842b

  • SHA256

    21f23d255a34405865686ba5d7b46deec222e50474ede65c9fceaf4254790e38

  • SHA512

    66678c23dc680a4f64adfa7f23d0d8d4eed35c39d8f7fe350b11be5a39289940e5a84e851e04c3d7e1c713d64a940dd70711fa8c8677baa949438471a0ee3d1c

  • SSDEEP

    384:NMMtyNUXRkRAiu9PbX2yl8W/8AoWBSQFxH/f4kVdjaLacmkC0GJsJxXSoVcGtWoc:HW2GAjSQFxfftjaLacmkLGKZSh

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\714978f7280e7927d34c8b6c4fc3b81d.exe
    "C:\Users\Admin\AppData\Local\Temp\714978f7280e7927d34c8b6c4fc3b81d.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      2⤵
        PID:2928

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads