Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 10:13

General

  • Target

    f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb.exe

  • Size

    743KB

  • MD5

    f53a5b00eaa86439c9bf502a7550f48a

  • SHA1

    e4f80447b09e17553bcbd8925662c9d1d3560ec7

  • SHA256

    f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb

  • SHA512

    801bd0b24a9beba576510c0fec2611280845dfe08c7b2e6af4db1a9fff15d49b71e6db0d80ceaae2bea4884b41372f8f0ef15834c7883abcc9cb44a6f9dbf960

  • SSDEEP

    12288:OyniETpbHidP4i6ilyczuHQYIHbyVyi3z7xdbWOfOEmi89Dj3TBurYcutGAkR:n7bHJQlw5VV37idXlDBY4Mn

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb.exe
    "C:\Users\Admin\AppData\Local\Temp\f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb.exe
      "C:\Users\Admin\AppData\Local\Temp\f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb.exe"
      2⤵
        PID:2852
      • C:\Users\Admin\AppData\Local\Temp\f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb.exe
        "C:\Users\Admin\AppData\Local\Temp\f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb.exe"
        2⤵
          PID:2764
        • C:\Users\Admin\AppData\Local\Temp\f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb.exe
          "C:\Users\Admin\AppData\Local\Temp\f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb.exe"
          2⤵
            PID:1128
          • C:\Users\Admin\AppData\Local\Temp\f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb.exe
            "C:\Users\Admin\AppData\Local\Temp\f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb.exe"
            2⤵
              PID:1152
            • C:\Users\Admin\AppData\Local\Temp\f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb.exe
              "C:\Users\Admin\AppData\Local\Temp\f82f959fe8660a9975cbd0255ba069507af5bdb24dc88b47b275ff98fbae0afb.exe"
              2⤵
                PID:2568

            Network

                  MITRE ATT&CK Matrix

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/1684-0-0x0000000074ABE000-0x0000000074ABF000-memory.dmp

                    Filesize

                    4KB

                  • memory/1684-1-0x00000000001F0000-0x00000000002AA000-memory.dmp

                    Filesize

                    744KB

                  • memory/1684-2-0x0000000074AB0000-0x000000007519E000-memory.dmp

                    Filesize

                    6.9MB

                  • memory/1684-3-0x0000000000430000-0x000000000044E000-memory.dmp

                    Filesize

                    120KB

                  • memory/1684-4-0x00000000004F0000-0x0000000000500000-memory.dmp

                    Filesize

                    64KB

                  • memory/1684-5-0x0000000000500000-0x0000000000516000-memory.dmp

                    Filesize

                    88KB

                  • memory/1684-6-0x0000000005830000-0x00000000058BA000-memory.dmp

                    Filesize

                    552KB

                  • memory/1684-7-0x0000000074AB0000-0x000000007519E000-memory.dmp

                    Filesize

                    6.9MB