Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29-10-2024 00:10

General

  • Target

    $77-Example.exe

  • Size

    47KB

  • MD5

    b503babbbac8d370ca0de5752ada2eb7

  • SHA1

    5995adbe90e6fbddae320d7af780749918f86c46

  • SHA256

    c0a64062375a690c4b7c3dda242973fb3e342f7e611ca7e9e5ee0398b8e7f435

  • SHA512

    a0ee4bb021bee3651144caf13a1235dd46c5a4f13239364db97ec355381e7b8d37e3c40813c1e1c217d51e81cf2348ffdfd148e2a75dcd12559f6419b4798181

  • SSDEEP

    768:OLA8Bd9tqyt4m52qJWXcm4owy78Lw8Vd9OPyt4m52FJWXcm4oq:OE87Dqe49JDwy78Lw8nkPe49WDq

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$77-Example.exe
    "C:\Users\Admin\AppData\Local\Temp\$77-Example.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2272

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2272-0-0x000007FEF5F83000-0x000007FEF5F84000-memory.dmp

    Filesize

    4KB

  • memory/2272-1-0x0000000000270000-0x0000000000282000-memory.dmp

    Filesize

    72KB

  • memory/2272-2-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2272-3-0x0000000000250000-0x000000000025A000-memory.dmp

    Filesize

    40KB

  • memory/2272-4-0x0000000000250000-0x000000000025A000-memory.dmp

    Filesize

    40KB

  • memory/2272-5-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2272-6-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2272-7-0x0000000000250000-0x000000000025A000-memory.dmp

    Filesize

    40KB

  • memory/2272-8-0x0000000000250000-0x000000000025A000-memory.dmp

    Filesize

    40KB