Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 17:36

General

  • Target

    393287d6f657632736a596b88c22f63aa791a9420c78e0d7781076f5861ddf69.msc

  • Size

    141KB

  • MD5

    acfa481a369f1e796756532822ee40b2

  • SHA1

    0c954543f656fbcc73eee6f49e854e4ac0cdc3ed

  • SHA256

    393287d6f657632736a596b88c22f63aa791a9420c78e0d7781076f5861ddf69

  • SHA512

    6b96ed746cfdc743052df466000da7cfbbe7b806a7891db1c482e0f2181fd095a887119d1d926b32da4ae1c6417d281789c85d61e4686d0aca8c8f550052225e

  • SSDEEP

    384:TmFbzTgeVr61if+xrgqMUPotMzPzV1p1h:4/TgGIif+xrMCPLp1h

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Windows\system32\mmc.exe
    C:\Windows\system32\mmc.exe "C:\Users\Admin\AppData\Local\Temp\393287d6f657632736a596b88c22f63aa791a9420c78e0d7781076f5861ddf69.msc"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2336-0-0x0000000002190000-0x0000000002191000-memory.dmp

    Filesize

    4KB

  • memory/2336-11-0x0000000002190000-0x0000000002191000-memory.dmp

    Filesize

    4KB