Analysis

  • max time kernel
    119s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-04-2024 10:33

General

  • Target

    41075a26a04b275417fdb62d276f62c8a0ef6a460dd1bed6dc45d9768680b2da.exe

  • Size

    60KB

  • MD5

    0b1d7c043be8c696d53d63fc0c834195

  • SHA1

    23063660cce71c3a456530cbfd9f35f24e150be2

  • SHA256

    41075a26a04b275417fdb62d276f62c8a0ef6a460dd1bed6dc45d9768680b2da

  • SHA512

    efba9fa70ebba40d12f6a9b9cd605fd139fcef033e0ddf458b6b6df07842565eda9859201a1705d009648bb2336988e26f5a21ea57833897b6b522d37b7c75ee

  • SSDEEP

    1536:yvfR0V/JL/JqUTqK2AUR880/rH4+XE53pIIDFYKrrXrPx5S:8aV7TqK2R880/r8fuQx5S

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41075a26a04b275417fdb62d276f62c8a0ef6a460dd1bed6dc45d9768680b2da.exe
    "C:\Users\Admin\AppData\Local\Temp\41075a26a04b275417fdb62d276f62c8a0ef6a460dd1bed6dc45d9768680b2da.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2200

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2200-0-0x0000000000C70000-0x0000000000C86000-memory.dmp

    Filesize

    88KB

  • memory/2200-1-0x000007FEF5DB0000-0x000007FEF679C000-memory.dmp

    Filesize

    9.9MB

  • memory/2200-2-0x00000000004F0000-0x0000000000570000-memory.dmp

    Filesize

    512KB

  • memory/2200-3-0x000007FEF5DB0000-0x000007FEF679C000-memory.dmp

    Filesize

    9.9MB

  • memory/2200-4-0x00000000004F0000-0x0000000000570000-memory.dmp

    Filesize

    512KB