Analysis

  • max time kernel
    150s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-01-2025 08:52

General

  • Target

    789537de608fd6cf3026c39d478c256c27cec8201c95a2142b344ada54835e73.exe

  • Size

    1.5MB

  • MD5

    8a437c7f12086b2be1fdbaf0e874362c

  • SHA1

    437b90213c7e0849408464ba822fc28389e4be67

  • SHA256

    789537de608fd6cf3026c39d478c256c27cec8201c95a2142b344ada54835e73

  • SHA512

    f9b7a1ba89d079c1c4f49c4c1dd9022f73b99f54dce2700f29003ae6b369f098de1d8d21b13537bcc2a8bff235befd4d8655ed67e08e5389ea94973e9c67154b

  • SSDEEP

    24576:n/PVLMJEjlYbFdn5dcIjKO/MT8d3hKvDSVXT5Xu/HaFyao:1MJ0YhN5LjKe53hKMXT5XuCF1o

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\789537de608fd6cf3026c39d478c256c27cec8201c95a2142b344ada54835e73.exe
    "C:\Users\Admin\AppData\Local\Temp\789537de608fd6cf3026c39d478c256c27cec8201c95a2142b344ada54835e73.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2072-0-0x000007FEF5293000-0x000007FEF5294000-memory.dmp

    Filesize

    4KB

  • memory/2072-3-0x00000000002A0000-0x00000000002D2000-memory.dmp

    Filesize

    200KB

  • memory/2072-6-0x000007FEF5290000-0x000007FEF5C7C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-7-0x000007FEF5290000-0x000007FEF5C7C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-8-0x0000000000270000-0x000000000027A000-memory.dmp

    Filesize

    40KB

  • memory/2072-9-0x0000000000270000-0x000000000027A000-memory.dmp

    Filesize

    40KB

  • memory/2072-10-0x000007FEF5290000-0x000007FEF5C7C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-36-0x000007FEF5293000-0x000007FEF5294000-memory.dmp

    Filesize

    4KB

  • memory/2072-37-0x000007FEF5290000-0x000007FEF5C7C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-39-0x0000000000270000-0x000000000027A000-memory.dmp

    Filesize

    40KB

  • memory/2072-38-0x0000000000270000-0x000000000027A000-memory.dmp

    Filesize

    40KB

  • memory/2072-40-0x000007FEF5290000-0x000007FEF5C7C000-memory.dmp

    Filesize

    9.9MB