Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2024 03:05

General

  • Target

    997b4c3d35b83fdcaea97767d5cf69ab24c2cd241fc5db2da2ff22705173c90c.exe

  • Size

    2.8MB

  • MD5

    7a8587f9f6c17963877ae33e36459d0c

  • SHA1

    f2b06e2f0a7d041d20a572dcd8d861bd98466dd7

  • SHA256

    997b4c3d35b83fdcaea97767d5cf69ab24c2cd241fc5db2da2ff22705173c90c

  • SHA512

    138cb5d8f334069c0d5934a9e06377e8a2d51f31b5c29b516f65d039978b5e2f5ef264352398a41b8a794d6f85eb7e506558bb84f8f28988e6bc297d407316c6

  • SSDEEP

    49152:hQi/YT4pGhWOK3sANkk5sn+iqA1FyCdPSAeqZaIOTfGRdF6jF9P8LjvU7mQ23r9y:FYT4pGhWvsAp5sn+iqA1FyCdPSmSGnF1

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\997b4c3d35b83fdcaea97767d5cf69ab24c2cd241fc5db2da2ff22705173c90c.exe
    "C:\Users\Admin\AppData\Local\Temp\997b4c3d35b83fdcaea97767d5cf69ab24c2cd241fc5db2da2ff22705173c90c.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4492

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads