Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    26-03-2024 02:54

General

  • Target

    86068b3a2d41e5b7641de56016200e51.exe

  • Size

    1.2MB

  • MD5

    86068b3a2d41e5b7641de56016200e51

  • SHA1

    acc2278a7c6d5bc0f0ee9bb8172d216c834b2db2

  • SHA256

    7e341808cfecc9cdc1f15125b30726b925cece4096ac3f5dfad682a63a2b5f79

  • SHA512

    32dcde20b1aa7a3ebaef4fab76a3e74ad741150b3e419b743d75893ed50577e1409bb0d7ccd80d6c487dd7d7117cf553b55fadbf4707c7ca06de69c6a514cf61

  • SSDEEP

    12288:rhYJERECAFwg3yvII+fCowohB7DLDAptNyvUgXZ32dT4ePc7N29Cxs5+j2QNbxfJ:cCAFwhII+fw0BMNyBo4kx929bL3Hnx

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86068b3a2d41e5b7641de56016200e51.exe
    "C:\Users\Admin\AppData\Local\Temp\86068b3a2d41e5b7641de56016200e51.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:1624

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1624-0-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB

  • memory/1624-1-0x0000000000210000-0x0000000000270000-memory.dmp

    Filesize

    384KB

  • memory/1624-8-0x0000000000210000-0x0000000000270000-memory.dmp

    Filesize

    384KB

  • memory/1624-7-0x0000000000210000-0x0000000000270000-memory.dmp

    Filesize

    384KB

  • memory/1624-12-0x0000000000210000-0x0000000000270000-memory.dmp

    Filesize

    384KB

  • memory/1624-14-0x0000000140000000-0x000000014013C000-memory.dmp

    Filesize

    1.2MB