Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 17:12

General

  • Target

    750f2e2b90e30631ae4deb554b261874.exe

  • Size

    13KB

  • MD5

    750f2e2b90e30631ae4deb554b261874

  • SHA1

    1e787663ef5caa9273fbd016e8e2b055e670a30e

  • SHA256

    778df9a7591e8bbfb98f70cc981102f707fa0d6ae37e2b885e0dcc771257d1b6

  • SHA512

    9efbb5742e0431a7e2040fe60b34fb51bffc8c7ab7c6a6e493bc23932c3f107475d687cd637d854fb0b5b3eb91db297669a1bed843d75c766cc11bf66efc10f4

  • SSDEEP

    192:XnN2kI2hcchf34J8v6WvNm+IP/4ehPJmwN+J3Yvu0pmgu/gTiE0e:XN26GifN44eh/O6u/rUj

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\750f2e2b90e30631ae4deb554b261874.exe
    "C:\Users\Admin\AppData\Local\Temp\750f2e2b90e30631ae4deb554b261874.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1944

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1944-1-0x0000000074960000-0x000000007504E000-memory.dmp
    Filesize

    6.9MB

  • memory/1944-0-0x0000000001220000-0x000000000122A000-memory.dmp
    Filesize

    40KB

  • memory/1944-2-0x0000000004F40000-0x0000000004F80000-memory.dmp
    Filesize

    256KB

  • memory/1944-3-0x0000000074960000-0x000000007504E000-memory.dmp
    Filesize

    6.9MB

  • memory/1944-4-0x0000000004F40000-0x0000000004F80000-memory.dmp
    Filesize

    256KB