Analysis

  • max time kernel
    0s
  • max time network
    7s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2024 23:32

General

  • Target

    Trojan/0xc6666666.exe

  • Size

    9KB

  • MD5

    8b07df8ab7160c2692e9f86334b3678e

  • SHA1

    ae11b4de120f9e87a2dbea10a5102ef3055aa859

  • SHA256

    8ef6ca3e52d30dfaf0df411fc670f899506ca19cbfe1a35c9ff417acf93252da

  • SHA512

    b69cf80172d82ceb7a3c878167e5e6bfd60e93b2c91afb834241f40a3829a5b57a88897d0e09e4b80a98732e4967d7e689f28ccb4975d9a68acc9941eed4b212

  • SSDEEP

    192:9+OXjfrOVqKnwzjOhfwN7E5pz6rJoZgW0AX:7TfCVNnqjFN7mOW0c

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan\0xc6666666.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan\0xc6666666.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2912

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads