Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2025 05:46

General

  • Target

    a3bfb0c0467add2381d22bb5c3ff21c762f72d38aef9245a79bca8064e9dc79f.exe

  • Size

    1.7MB

  • MD5

    ef26cac5ace83ed51d369632bf8b8ee1

  • SHA1

    994556135628fe8c0d1b78971d4aa7976a2401f3

  • SHA256

    a3bfb0c0467add2381d22bb5c3ff21c762f72d38aef9245a79bca8064e9dc79f

  • SHA512

    b31d980e07ce37c726d3b5fd794fb777e6ecf1a82a5b2d0837aa11ab95dc9e3eb0be71fd66ed97cfa7fb6c13fd79be8b97e59f8baa9e4e84cb44ff250eb59afa

  • SSDEEP

    24576:vmQn8AtHx3OXiORxXpv9aRmqZhm9tChfKsKNDSVXT5XUjlkyar:vm8tHAXV3Xp2m6h0UfKszXT5XUjG1r

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3bfb0c0467add2381d22bb5c3ff21c762f72d38aef9245a79bca8064e9dc79f.exe
    "C:\Users\Admin\AppData\Local\Temp\a3bfb0c0467add2381d22bb5c3ff21c762f72d38aef9245a79bca8064e9dc79f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2236

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabCC44.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • memory/2236-8-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB

  • memory/2236-3-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB

  • memory/2236-1-0x0000000000150000-0x0000000000184000-memory.dmp

    Filesize

    208KB

  • memory/2236-39-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB

  • memory/2236-5-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB

  • memory/2236-6-0x00000000001A0000-0x00000000001AA000-memory.dmp

    Filesize

    40KB

  • memory/2236-7-0x00000000001A0000-0x00000000001AA000-memory.dmp

    Filesize

    40KB

  • memory/2236-0-0x000007FEF5983000-0x000007FEF5984000-memory.dmp

    Filesize

    4KB

  • memory/2236-49-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB

  • memory/2236-2-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB

  • memory/2236-4-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB

  • memory/2236-43-0x000007FEF5983000-0x000007FEF5984000-memory.dmp

    Filesize

    4KB

  • memory/2236-44-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB

  • memory/2236-45-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB

  • memory/2236-46-0x00000000001A0000-0x00000000001AA000-memory.dmp

    Filesize

    40KB

  • memory/2236-47-0x00000000001A0000-0x00000000001AA000-memory.dmp

    Filesize

    40KB

  • memory/2236-48-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB

  • memory/2236-12-0x000007FEF5980000-0x000007FEF636C000-memory.dmp

    Filesize

    9.9MB