Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2024, 16:15

General

  • Target

    8753fd0f95dd863e8466319c025f3cab.exe

  • Size

    24KB

  • MD5

    8753fd0f95dd863e8466319c025f3cab

  • SHA1

    4fc2700a5c35dfd25b95c0657bd1f25f941a1486

  • SHA256

    cab0fbe0e31af603ceb54ea7e21af9fcc3d01158251670a67f9181224810c1f9

  • SHA512

    496a6450a5d776eec9f7ce784963c183c984b25c62550a1f83c5b9403781d90bf062232d23ea2b3d2fc75df627a37b53a3d5a92f36849921cde56b641d3afcba

  • SSDEEP

    384:2ddmAkbFyDXnxRCDogW/8AoW0fQFxH/f4kVdjaLacmkC0GJsJxXSdqWxDEWl:RVbFmhQDoqA6fQFxfftjaLacmkLGK+3

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8753fd0f95dd863e8466319c025f3cab.exe
    "C:\Users\Admin\AppData\Local\Temp\8753fd0f95dd863e8466319c025f3cab.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe
      2⤵
        PID:1248

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads