Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-06-2024 13:17

General

  • Target

    iconAnimate.exe

  • Size

    354KB

  • MD5

    6dbe3354412023f29fb7da12ba11454d

  • SHA1

    27841a8e84fff0a320b541de66a5f465c3ac2f0d

  • SHA256

    37b6467213f93dfab4974cbc7d19b9a400f95b7c065dddb49904075fa402f4ba

  • SHA512

    6a8fc5c08263c6fe4a589647f1c206b26c7d941a2a4682a9393a96f69eff9b01ae22379f530a7e1a3cda3f5817ceefa4765ebd337c6b5522dce926a48048e9e1

  • SSDEEP

    6144:5lYIXLG7Md0lVsukmKiuwv11rf1Ar3QGC70uYGxH8EqY:5pi7MdeQiuwNV1A/C7ikmY

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1116
      • C:\Users\Admin\AppData\Local\Temp\iconAnimate.exe
        "C:\Users\Admin\AppData\Local\Temp\iconAnimate.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1924

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1116-2-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-1-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-0-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-25-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-24-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-23-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-22-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-21-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-20-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-19-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-3-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-18-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-17-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-16-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-15-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-14-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-13-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-12-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-11-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-10-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-9-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-8-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-7-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-6-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-5-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/1116-4-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB