Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2025 16:56

General

  • Target

    50498428eaa263175c76e4f484ab87fe8edfa3239191bc10f99d8b9a00dee511.exe

  • Size

    1.3MB

  • MD5

    db02516dbd5c7b7e3f672ce6555e39bd

  • SHA1

    349f84f9646aef477b94101e6a8ddb4cf0f8aafb

  • SHA256

    50498428eaa263175c76e4f484ab87fe8edfa3239191bc10f99d8b9a00dee511

  • SHA512

    9bc460dde6072ad226a009736498c060131ddc98e5b73152aad72688bbd28dbcfd375c7cc4f82a4a3de1622f19de8becd0bb61cf12756cb15cb5de84a706d65f

  • SSDEEP

    24576:WrDYzO6UmW/N8CNx0pGIBvIIkzgsd7Td7XWYbJ74DSQ0V3t:UYzMmGSCNyPypzgsdvdDWYV7J3t

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50498428eaa263175c76e4f484ab87fe8edfa3239191bc10f99d8b9a00dee511.exe
    "C:\Users\Admin\AppData\Local\Temp\50498428eaa263175c76e4f484ab87fe8edfa3239191bc10f99d8b9a00dee511.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2532

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2532-0-0x000007FEF5F83000-0x000007FEF5F84000-memory.dmp

    Filesize

    4KB

  • memory/2532-1-0x0000000000140000-0x0000000000172000-memory.dmp

    Filesize

    200KB

  • memory/2532-2-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-3-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-4-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-7-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-10-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-9-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-11-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-12-0x000007FEF5F83000-0x000007FEF5F84000-memory.dmp

    Filesize

    4KB

  • memory/2532-13-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-27-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-28-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-29-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-30-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-31-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-32-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB

  • memory/2532-33-0x000007FEF5F80000-0x000007FEF696C000-memory.dmp

    Filesize

    9.9MB