Analysis

  • max time kernel
    150s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2025 21:44

General

  • Target

    99f5e4dd00a73e8aa163b8504b2f0b93cd9e85e237e34ea241345f7b990dc7ac.exe

  • Size

    2.0MB

  • MD5

    01f7f080571b33072a6da39c6a15e795

  • SHA1

    c557f13332cdfa676b3e4714fca710df8ebcdd61

  • SHA256

    99f5e4dd00a73e8aa163b8504b2f0b93cd9e85e237e34ea241345f7b990dc7ac

  • SHA512

    3ac50d5c00ecb5156e113039a8c6f763f34bd8020c7b7ffb3b73f83d875fd323af18609d971c215031e9a1831ea2bb06ba4c73e2d390f45391e73ef382dd3a78

  • SSDEEP

    49152:AVImnP3ObryxvZcaS39o1LsWO4iaXT5XeM15:A8OOaS36D5r15

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99f5e4dd00a73e8aa163b8504b2f0b93cd9e85e237e34ea241345f7b990dc7ac.exe
    "C:\Users\Admin\AppData\Local\Temp\99f5e4dd00a73e8aa163b8504b2f0b93cd9e85e237e34ea241345f7b990dc7ac.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2172-0-0x000007FEF6233000-0x000007FEF6234000-memory.dmp

    Filesize

    4KB

  • memory/2172-1-0x0000000001D10000-0x0000000001D44000-memory.dmp

    Filesize

    208KB

  • memory/2172-2-0x000007FEF6230000-0x000007FEF6C1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2172-3-0x000007FEF6230000-0x000007FEF6C1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2172-4-0x000007FEF6230000-0x000007FEF6C1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2172-6-0x0000000002270000-0x000000000227A000-memory.dmp

    Filesize

    40KB

  • memory/2172-5-0x0000000002270000-0x000000000227A000-memory.dmp

    Filesize

    40KB

  • memory/2172-7-0x000007FEF6230000-0x000007FEF6C1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2172-11-0x000007FEF6230000-0x000007FEF6C1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2172-30-0x000007FEF6233000-0x000007FEF6234000-memory.dmp

    Filesize

    4KB

  • memory/2172-31-0x000007FEF6230000-0x000007FEF6C1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2172-32-0x000007FEF6230000-0x000007FEF6C1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2172-33-0x000007FEF6230000-0x000007FEF6C1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2172-34-0x0000000002270000-0x000000000227A000-memory.dmp

    Filesize

    40KB

  • memory/2172-35-0x0000000002270000-0x000000000227A000-memory.dmp

    Filesize

    40KB

  • memory/2172-36-0x000007FEF6230000-0x000007FEF6C1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2172-37-0x000007FEF6230000-0x000007FEF6C1C000-memory.dmp

    Filesize

    9.9MB