Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 23:46

General

  • Target

    b6838e142a69c7833531d379f5349e3393a87505e87fce88be43b687c7dceb9a.exe

  • Size

    1.3MB

  • MD5

    412062c16487989312ff81269b1a4848

  • SHA1

    d0f9e57706c4dc986c6c05a728fbbe591a253695

  • SHA256

    b6838e142a69c7833531d379f5349e3393a87505e87fce88be43b687c7dceb9a

  • SHA512

    6317193c21ca288968b314fa248dcbb8543733b6cd3cd4fdbc64f313536ba27f31d120af021dd4a2b09aa6097469c9f190611fe609e402e987dd205894abacaa

  • SSDEEP

    24576:SuRRjq45RYz698NPWxBLudQCbJ74A9WDSPX7j:tRu4rYzgIQL+xV77917j

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6838e142a69c7833531d379f5349e3393a87505e87fce88be43b687c7dceb9a.exe
    "C:\Users\Admin\AppData\Local\Temp\b6838e142a69c7833531d379f5349e3393a87505e87fce88be43b687c7dceb9a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2072-0-0x000007FEF5573000-0x000007FEF5574000-memory.dmp

    Filesize

    4KB

  • memory/2072-1-0x0000000001B70000-0x0000000001BA2000-memory.dmp

    Filesize

    200KB

  • memory/2072-2-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-3-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-4-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-7-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-9-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-10-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-11-0x000007FEF5573000-0x000007FEF5574000-memory.dmp

    Filesize

    4KB

  • memory/2072-12-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-26-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-27-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-28-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-29-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-30-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

    Filesize

    9.9MB