Analysis

  • max time kernel
    150s
  • max time network
    73s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30-01-2025 04:42

General

  • Target

    5e37b027000dd6c2257c63f54373d3ee4e05e85d68d78635c3374addab291d64.exe

  • Size

    1.3MB

  • MD5

    b3cae3fdaca58c3b817c882035a05443

  • SHA1

    e57954779d89d6e197c36802f4a5744ae13c7853

  • SHA256

    5e37b027000dd6c2257c63f54373d3ee4e05e85d68d78635c3374addab291d64

  • SHA512

    0315cdcc3d100a70cf45c497270e8aab39bb9e956c6ecde7ce5aa32b804a69506b215b5f8ef192587c006c38441fdff238a1c40de6f2e2ff4075497fa6f46bbe

  • SSDEEP

    24576:uUv1YsdCeJKdesyFb1KUQAZQlvEurZ7skBDSVXT5Xcdzi2yaX:NvKsdCeJK4syFbI4UvEurlsJXT5XOzi6

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e37b027000dd6c2257c63f54373d3ee4e05e85d68d78635c3374addab291d64.exe
    "C:\Users\Admin\AppData\Local\Temp\5e37b027000dd6c2257c63f54373d3ee4e05e85d68d78635c3374addab291d64.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2396

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2396-0-0x000007FEF5A93000-0x000007FEF5A94000-memory.dmp

    Filesize

    4KB

  • memory/2396-1-0x0000000000150000-0x0000000000184000-memory.dmp

    Filesize

    208KB

  • memory/2396-2-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2396-3-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2396-4-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2396-5-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2396-6-0x0000000000410000-0x000000000041A000-memory.dmp

    Filesize

    40KB

  • memory/2396-7-0x0000000000410000-0x000000000041A000-memory.dmp

    Filesize

    40KB

  • memory/2396-8-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2396-9-0x000007FEF5A93000-0x000007FEF5A94000-memory.dmp

    Filesize

    4KB

  • memory/2396-10-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2396-13-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2396-15-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2396-16-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2396-35-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2396-36-0x0000000000410000-0x000000000041A000-memory.dmp

    Filesize

    40KB

  • memory/2396-37-0x0000000000410000-0x000000000041A000-memory.dmp

    Filesize

    40KB

  • memory/2396-38-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2396-39-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB