Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    10-10-2024 16:05

General

  • Target

    17d9b7e824286827ea796b2200f55b53a70878288715fdd20f6f6f9a983973e9.exe

  • Size

    1.6MB

  • MD5

    9a6fcbab6a028d0e8698fb3c4f73123e

  • SHA1

    f3a53ca261b0e7c5104641758e35bf21c4a39961

  • SHA256

    17d9b7e824286827ea796b2200f55b53a70878288715fdd20f6f6f9a983973e9

  • SHA512

    8b0e68ffab743f2124fcd4eca9fefb9bba532472689b5ff108133a1045562c08ad3db97c51fa2a82d3e034c10cb5ef2d5d0543e26d98a5808936e450ba8fc373

  • SSDEEP

    24576:BACGX1iSUUwH3ASGIfnum/GN32ot/iXUFT2AUxqbpWgKPaoru5IJkEQs:BACGXfi3AStnum/3CGEAx7a49GRs

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17d9b7e824286827ea796b2200f55b53a70878288715fdd20f6f6f9a983973e9.exe
    "C:\Users\Admin\AppData\Local\Temp\17d9b7e824286827ea796b2200f55b53a70878288715fdd20f6f6f9a983973e9.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2876

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2876-0-0x000007FEF5E33000-0x000007FEF5E34000-memory.dmp

    Filesize

    4KB

  • memory/2876-1-0x0000000000250000-0x0000000000284000-memory.dmp

    Filesize

    208KB

  • memory/2876-2-0x0000000000250000-0x0000000000284000-memory.dmp

    Filesize

    208KB

  • memory/2876-3-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2876-4-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2876-5-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2876-7-0x0000000001F20000-0x0000000001F2A000-memory.dmp

    Filesize

    40KB

  • memory/2876-6-0x0000000001F20000-0x0000000001F2A000-memory.dmp

    Filesize

    40KB

  • memory/2876-8-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2876-12-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2876-31-0x000007FEF5E33000-0x000007FEF5E34000-memory.dmp

    Filesize

    4KB

  • memory/2876-32-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2876-33-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2876-34-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2876-35-0x0000000001F20000-0x0000000001F2A000-memory.dmp

    Filesize

    40KB

  • memory/2876-36-0x0000000001F20000-0x0000000001F2A000-memory.dmp

    Filesize

    40KB

  • memory/2876-37-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB

  • memory/2876-38-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

    Filesize

    9.9MB