Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2024 12:00

General

  • Target

    cad51c2ccdea145e70b041891e511917.exe

  • Size

    726KB

  • MD5

    cad51c2ccdea145e70b041891e511917

  • SHA1

    5e6b288348a790a91a27c434ee1eaebadacbe12c

  • SHA256

    55c0166f790956e3be24cd3ee78c69ebab031ed62bfbda058b3a653c1a75b518

  • SHA512

    cb498dcf9b526c91547f4e1baa5a3c9bd1655a1c30661058e40aaa8e28b91aa0a335fc08cfd30617bd4c64a922cf7adf917cea3a5da6cedf82291bee1e7dc25d

  • SSDEEP

    12288:6D6YDzqx5XBNt1BrivR0V4TBjgYxs1wl206gBawFV2ceSb0BQ/GfM/4QiAzojgJI:6D6Y3qx51NbXA

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\cad51c2ccdea145e70b041891e511917.exe
    "C:\Users\Admin\AppData\Local\Temp\cad51c2ccdea145e70b041891e511917.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2656-0-0x000007FEF6123000-0x000007FEF6124000-memory.dmp

    Filesize

    4KB

  • memory/2656-1-0x0000000000A90000-0x0000000000B4C000-memory.dmp

    Filesize

    752KB

  • memory/2656-2-0x000007FEF6120000-0x000007FEF6B0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2656-3-0x000007FEF6120000-0x000007FEF6B0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2656-4-0x000007FEF6123000-0x000007FEF6124000-memory.dmp

    Filesize

    4KB

  • memory/2656-5-0x000007FEF6120000-0x000007FEF6B0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2656-6-0x000007FEF6120000-0x000007FEF6B0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2656-7-0x000007FEF6120000-0x000007FEF6B0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2656-8-0x000007FEF6120000-0x000007FEF6B0C000-memory.dmp

    Filesize

    9.9MB