Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-05-2024 05:22

General

  • Target

    iconTips.exe

  • Size

    402KB

  • MD5

    6497ef7e23b342b30a495b02309a8eb7

  • SHA1

    cb483f835174c4de6296b2d723a856ad745135f8

  • SHA256

    895bcd9b2926318d918a39a48fa1de432a0c9f0d92f5bb46673a2bc380b80bec

  • SHA512

    f8144690336af36314443e81c433f79ae74cd6b55b6206d40bec887afd9ad4382fb7628fc8f66020fc4e98d08c15070f4bcef0c3d3efdf4aa8ec1f3884f189b5

  • SSDEEP

    6144:kHAYGNMpEW4Kj1MqgOMYwHR5mV1TiyuqnODoRPPq:kgYGNIEW4KjaOwx5OTiOOD6Pq

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\iconTips.exe
        "C:\Users\Admin\AppData\Local\Temp\iconTips.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2252

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1188-27-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-26-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-25-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-24-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-23-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-22-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-21-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-20-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-19-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-18-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-17-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-16-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-15-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-14-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-13-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-12-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-11-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-10-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-9-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-8-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-7-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-6-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-5-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-4-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-3-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-2-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-1-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/1188-0-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB