Analysis

  • max time kernel
    29s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-11-2024 04:33

General

  • Target

    246f939789eb66df0dc7cb67c22ebcb8c0cfe4b0ec0f222482da9b2823e9ab32N.exe

  • Size

    128KB

  • MD5

    285eb8f7641526bf825641f3e79559f1

  • SHA1

    d5b86d8ef7bb15b0509494fcf94c56159bac0b44

  • SHA256

    4a9acb3d5974e491d5ff17867b79f3fb1b6c244674d4ca56d70eaa133e17d672

  • SHA512

    094fb8642d389a7fa570f3f16dbd6042ef6d472feb45b1c00c6cc6c4815764e31e5ea43583244095aa5d1010d779415a66d223b9ff60ae96a06400cab7d52eda

  • SSDEEP

    3072:4KkwPHTgqHc/nREvhnQ78e5S+wbDwEKT3uj9E0Gp:o6z5HVpQ89gEK/0Y

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\246f939789eb66df0dc7cb67c22ebcb8c0cfe4b0ec0f222482da9b2823e9ab32N.exe
    "C:\Users\Admin\AppData\Local\Temp\246f939789eb66df0dc7cb67c22ebcb8c0cfe4b0ec0f222482da9b2823e9ab32N.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1860-0-0x000007FEF5233000-0x000007FEF5234000-memory.dmp

    Filesize

    4KB

  • memory/1860-1-0x0000000000B80000-0x0000000000BA6000-memory.dmp

    Filesize

    152KB

  • memory/1860-2-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

    Filesize

    9.9MB

  • memory/1860-4-0x000007FEF5230000-0x000007FEF5C1C000-memory.dmp

    Filesize

    9.9MB