Analysis

  • max time kernel
    143s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 16:44

General

  • Target

    068b96ec2a520caf46a59385b9910b282cd240fd43840e20e3c367b7cd010cfe.exe

  • Size

    305KB

  • MD5

    1b7df1a423ea6282063fd060266862c6

  • SHA1

    b78873befbfc35d28efbe685c6b6ab858ba66174

  • SHA256

    068b96ec2a520caf46a59385b9910b282cd240fd43840e20e3c367b7cd010cfe

  • SHA512

    7aafd159eb0d78d788d241a0635acee0f58e12f9be9faa8609bfee6f7f120f1a939604a41ce31558a0a978ce02545d929ae1b615b863ecb37d0cb5a89ed8d7a8

  • SSDEEP

    6144:jJHGyoPwcMZAwSYQ1rL4OgbDetAfhiRdsLvOJ0tYRVlOPAKeJNO4:RGyoPwcMZhnQ1rL4OKDeMhi3sLv7cY4

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\068b96ec2a520caf46a59385b9910b282cd240fd43840e20e3c367b7cd010cfe.exe
    "C:\Users\Admin\AppData\Local\Temp\068b96ec2a520caf46a59385b9910b282cd240fd43840e20e3c367b7cd010cfe.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\3256DFC842BC3625698399\3256DFC842BC3625698399.exe

    Filesize

    305KB

    MD5

    1b7df1a423ea6282063fd060266862c6

    SHA1

    b78873befbfc35d28efbe685c6b6ab858ba66174

    SHA256

    068b96ec2a520caf46a59385b9910b282cd240fd43840e20e3c367b7cd010cfe

    SHA512

    7aafd159eb0d78d788d241a0635acee0f58e12f9be9faa8609bfee6f7f120f1a939604a41ce31558a0a978ce02545d929ae1b615b863ecb37d0cb5a89ed8d7a8