Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2025 21:46

General

  • Target

    46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe

  • Size

    1.7MB

  • MD5

    bc91a78105e69a80ff6a4b76a7f85820

  • SHA1

    b03f4615125cca602e7c180321d93101e17d8c19

  • SHA256

    46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f

  • SHA512

    fc459e2e07040497e6f5707aae3bcf12e90b267936679f30b5040d815c0cea86b74b428bf00e5a14760f26094c6fb1f787adf56d456aac3de66c4fd66090b3cd

  • SSDEEP

    24576:1QnaP+tCiiEUjkGIIWCSwGPyRIoEQpLSvsd3TDSVXT5XtqPya0:1z+tCkUjzIIWCMqRIocUdAXT5XgP10

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe
    "C:\Users\Admin\AppData\Local\Temp\46d6cfabc8aff2beb774e5eec57fe3bec47188b4598772d8ccb007700288b84f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2380

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2380-0-0x000007FEF58F3000-0x000007FEF58F4000-memory.dmp

    Filesize

    4KB

  • memory/2380-1-0x0000000000240000-0x0000000000274000-memory.dmp

    Filesize

    208KB

  • memory/2380-2-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2380-3-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2380-4-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2380-7-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2380-6-0x0000000000290000-0x000000000029A000-memory.dmp

    Filesize

    40KB

  • memory/2380-5-0x0000000000290000-0x000000000029A000-memory.dmp

    Filesize

    40KB

  • memory/2380-11-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2380-34-0x000007FEF58F3000-0x000007FEF58F4000-memory.dmp

    Filesize

    4KB

  • memory/2380-35-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2380-36-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2380-37-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2380-38-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2380-39-0x0000000000290000-0x000000000029A000-memory.dmp

    Filesize

    40KB

  • memory/2380-40-0x0000000000290000-0x000000000029A000-memory.dmp

    Filesize

    40KB

  • memory/2380-41-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2380-42-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp

    Filesize

    9.9MB