Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/04/2024, 12:24

General

  • Target

    20c860e39ba1c4ec77cdb3ec3b2f4edd150602b75e36d9dcc1d7a4b3642c20da.exe

  • Size

    321KB

  • MD5

    2a7aeca204405c91c925c565fe283b62

  • SHA1

    131e2cbe190f8265094c0a4fe875c438d97794a6

  • SHA256

    20c860e39ba1c4ec77cdb3ec3b2f4edd150602b75e36d9dcc1d7a4b3642c20da

  • SHA512

    b6be74ee2aca11af187e73dab256be20c127e4bf9e7b8b57bc4d1921929ee13ac78e86ebe3665524833f1c043b6a8055312c18d8d8b36a0c2c3632e6dcc484c3

  • SSDEEP

    3072:9MNoKU4A/PdFN1/MM8mB1gr3rPTUFDTqH85Y135dcBcl81wBKLJoY46heu5VwIF7:NdFf/Z8mB1gr3r7UFngR1v+tohM/FHX

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20c860e39ba1c4ec77cdb3ec3b2f4edd150602b75e36d9dcc1d7a4b3642c20da.exe
    "C:\Users\Admin\AppData\Local\Temp\20c860e39ba1c4ec77cdb3ec3b2f4edd150602b75e36d9dcc1d7a4b3642c20da.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2124

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads