Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2025 21:46

General

  • Target

    74c48d240e3f98fb1f2f41ee40837425ea2fda5fd2da3f3cd3e5b22b5cc57507.exe

  • Size

    1.4MB

  • MD5

    15ded44045b6b553a5cd664ce1994b6d

  • SHA1

    ce541fc0dbb91e8c57fe0bc2eec98ab620e8bccc

  • SHA256

    74c48d240e3f98fb1f2f41ee40837425ea2fda5fd2da3f3cd3e5b22b5cc57507

  • SHA512

    5de2c2573a170453845a44910b3ab23a183332945cf465ad3a0e22fac907efe18261b2dd2a4ce08e6a8977f35e120c8f42f8ae1a086bdbfe23112c3e2184a8ed

  • SSDEEP

    24576:zS2r2fUlJc3K9h1d4jWUzrq4xQkQvwZHbJ7Bx4ZDSgsoio:08o3ehLq5rq4fQvwNV774bio

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74c48d240e3f98fb1f2f41ee40837425ea2fda5fd2da3f3cd3e5b22b5cc57507.exe
    "C:\Users\Admin\AppData\Local\Temp\74c48d240e3f98fb1f2f41ee40837425ea2fda5fd2da3f3cd3e5b22b5cc57507.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2076

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2076-0-0x000007FEF4C83000-0x000007FEF4C84000-memory.dmp

    Filesize

    4KB

  • memory/2076-1-0x0000000000450000-0x0000000000498000-memory.dmp

    Filesize

    288KB

  • memory/2076-2-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-3-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-4-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-5-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-8-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-11-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-10-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-12-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-31-0x000007FEF4C83000-0x000007FEF4C84000-memory.dmp

    Filesize

    4KB

  • memory/2076-32-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-33-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-34-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-35-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-36-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-37-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB

  • memory/2076-38-0x000007FEF4C80000-0x000007FEF566C000-memory.dmp

    Filesize

    9.9MB