Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07/06/2024, 08:12

General

  • Target

    1.exe

  • Size

    75KB

  • MD5

    302f6ce912598abf4195de92a5e02004

  • SHA1

    392469205cc5b2ce311a27414f471c67f856c2b4

  • SHA256

    90b112bdd91653ba38fbc373ed28c7bf9467f67f64d24f1aca0dd2a4829f245d

  • SHA512

    f94fb063704ae86c558ef2b6239286499e316635823cc547ab346ed822821eea50553beddeb1829806bb6bef3c74742b8ce29433066bb4b0c037c93f1cbecf83

  • SSDEEP

    1536:ewyvklZg6SqkKjsV7fAEOD1wZPsMa9OTWa3:ewg0Z5SqhQVcSZPsvOTWc

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2028

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2028-0-0x00000000745EE000-0x00000000745EF000-memory.dmp

    Filesize

    4KB

  • memory/2028-1-0x00000000010F0000-0x000000000110A000-memory.dmp

    Filesize

    104KB

  • memory/2028-2-0x00000000745E0000-0x0000000074CCE000-memory.dmp

    Filesize

    6.9MB

  • memory/2028-3-0x00000000745EE000-0x00000000745EF000-memory.dmp

    Filesize

    4KB

  • memory/2028-4-0x00000000745E0000-0x0000000074CCE000-memory.dmp

    Filesize

    6.9MB