Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2024 02:20

General

  • Target

    55c0166f790956e3be24cd3ee78c69ebab031ed62bfbda058b3a653c1a75b518.exe

  • Size

    726KB

  • MD5

    cad51c2ccdea145e70b041891e511917

  • SHA1

    5e6b288348a790a91a27c434ee1eaebadacbe12c

  • SHA256

    55c0166f790956e3be24cd3ee78c69ebab031ed62bfbda058b3a653c1a75b518

  • SHA512

    cb498dcf9b526c91547f4e1baa5a3c9bd1655a1c30661058e40aaa8e28b91aa0a335fc08cfd30617bd4c64a922cf7adf917cea3a5da6cedf82291bee1e7dc25d

  • SSDEEP

    12288:6D6YDzqx5XBNt1BrivR0V4TBjgYxs1wl206gBawFV2ceSb0BQ/GfM/4QiAzojgJI:6D6Y3qx51NbXA

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\55c0166f790956e3be24cd3ee78c69ebab031ed62bfbda058b3a653c1a75b518.exe
    "C:\Users\Admin\AppData\Local\Temp\55c0166f790956e3be24cd3ee78c69ebab031ed62bfbda058b3a653c1a75b518.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2648-4-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

    Filesize

    9.9MB

  • memory/2648-3-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

    Filesize

    9.9MB

  • memory/2648-2-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

    Filesize

    9.9MB

  • memory/2648-1-0x00000000003C0000-0x000000000047C000-memory.dmp

    Filesize

    752KB

  • memory/2648-0-0x000007FEF57C3000-0x000007FEF57C4000-memory.dmp

    Filesize

    4KB

  • memory/2648-5-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

    Filesize

    9.9MB