Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2024 09:56

General

  • Target

    71ecb6b43a570d7d31ac1a467cdbfddf.exe

  • Size

    36KB

  • MD5

    71ecb6b43a570d7d31ac1a467cdbfddf

  • SHA1

    02fe5e091dec660dafd1cf21f88a431dedc796f8

  • SHA256

    dcf884c29521dcb5683b6897d86c7488016df98738f99268bcae9f5fa3a20b3e

  • SHA512

    76ab61429e05627f398aeebaaa9d94a76b38b73360ad7aac86a37780dc91a5e26e414416dd207a397a8156c9d04f7ec186bc699727aa3bc09cc30f728896fec0

  • SSDEEP

    384:AX8BR9cTZ4i+dIntf/scNaReg7RNC596wrEWzlaX8u8w1P:AX8ZcTc+tf/sckRegynjEWNw1P

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71ecb6b43a570d7d31ac1a467cdbfddf.exe
    "C:\Users\Admin\AppData\Local\Temp\71ecb6b43a570d7d31ac1a467cdbfddf.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3060-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB