Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2024 13:36

General

  • Target

    7zSCD97F9B7/61cf42d8cfbf4_Fri175590209.exe

  • Size

    178KB

  • MD5

    f8c7d533e566557eb19e6a89f910ab6b

  • SHA1

    a225ef1c22fcd29562bd5f8a2d0da3969a5393cb

  • SHA256

    697949b98fd6207152522f27bcfea3716c336a8cab81751738eda59fd6067dee

  • SHA512

    a450548c41c45955206459d58f712284b4589bad7a93d9a6c98c5cd0f1f48cb66ee56cc2568e5dfd1fd174fdc6fa4bd249f5b1c9521dc018ec5b90718d0c97b1

  • SSDEEP

    3072:+aU3o2140NKteqz0d6EPMGz9tEsyyyyyhxxxxi+ElqRKbCG:vU3LTNgeqk6EP/pIxxxxj

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7zSCD97F9B7\61cf42d8cfbf4_Fri175590209.exe
    "C:\Users\Admin\AppData\Local\Temp\7zSCD97F9B7\61cf42d8cfbf4_Fri175590209.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4264

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4264-0-0x00007FF868443000-0x00007FF868445000-memory.dmp

    Filesize

    8KB

  • memory/4264-1-0x00000000008E0000-0x0000000000916000-memory.dmp

    Filesize

    216KB

  • memory/4264-2-0x00000000010C0000-0x00000000010C6000-memory.dmp

    Filesize

    24KB

  • memory/4264-3-0x00007FF868440000-0x00007FF868F01000-memory.dmp

    Filesize

    10.8MB

  • memory/4264-4-0x00007FF868443000-0x00007FF868445000-memory.dmp

    Filesize

    8KB

  • memory/4264-5-0x00007FF868440000-0x00007FF868F01000-memory.dmp

    Filesize

    10.8MB