Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 20:04

General

  • Target

    Client.exe

  • Size

    253KB

  • MD5

    f7bea0ecab72f62723c2557d52dd56ed

  • SHA1

    d1b0d1fd02c7192e03163de4dd66095a39b49076

  • SHA256

    446f2ae338368abe954d2417fbd953c371a6e8787c2f2236a1b399fb55846e48

  • SHA512

    1489bcffdcfe5ad147639d0eceb4242d6dd7095be9f1dfe89e80a6c1c46fee076c0f299e21addc75a526d6fe11c5a16c4ca403de10e8dfcfdaeec2af28a5c909

  • SSDEEP

    6144:WHgnPV2KM6IN+Sq9e6VlWT8b9axsyqbk9Rbzock:yUlzPVle8P3QFoc

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
    1⤵
      PID:2136
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3016

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2136-0-0x000007FEF5783000-0x000007FEF5784000-memory.dmp

            Filesize

            4KB

          • memory/2136-1-0x0000000000370000-0x00000000003B6000-memory.dmp

            Filesize

            280KB

          • memory/3016-2-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB