Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2025 05:04

General

  • Target

    6aff448dd70756422203bf519059c4f91cd9055d083fa73234cbd3d0a19bb888.exe

  • Size

    1.6MB

  • MD5

    f03a5442ccbf3f914958ef4cf73aecee

  • SHA1

    812f058fe6f69b683b005c2fc6ef7c60245a3f9e

  • SHA256

    6aff448dd70756422203bf519059c4f91cd9055d083fa73234cbd3d0a19bb888

  • SHA512

    c8d81d2dc1507a77acf644038ef72498d9f0cb09874c45f9cb9e0260970d265fb2e3495887e6f609ef162a02adf5fd4dde0731d49e0d0ed3ba7370bb4ac6ee0e

  • SSDEEP

    24576:hc1tcIZ2DIuXLFa0J7sjyoNfLqrnYnj6+1Wv61IOlDSVXT5Xuid95kyam:hEcIc5U0Jho12E6X6JaXT5XNdvk1m

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6aff448dd70756422203bf519059c4f91cd9055d083fa73234cbd3d0a19bb888.exe
    "C:\Users\Admin\AppData\Local\Temp\6aff448dd70756422203bf519059c4f91cd9055d083fa73234cbd3d0a19bb888.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1740-0-0x000007FEF5B43000-0x000007FEF5B44000-memory.dmp

    Filesize

    4KB

  • memory/1740-1-0x0000000001B80000-0x0000000001BB4000-memory.dmp

    Filesize

    208KB

  • memory/1740-2-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-3-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-4-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-5-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-6-0x0000000001BC0000-0x0000000001BCA000-memory.dmp

    Filesize

    40KB

  • memory/1740-8-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-7-0x0000000001BC0000-0x0000000001BCA000-memory.dmp

    Filesize

    40KB

  • memory/1740-12-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-35-0x000007FEF5B43000-0x000007FEF5B44000-memory.dmp

    Filesize

    4KB

  • memory/1740-36-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-37-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-38-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-39-0x0000000001BC0000-0x0000000001BCA000-memory.dmp

    Filesize

    40KB

  • memory/1740-40-0x0000000001BC0000-0x0000000001BCA000-memory.dmp

    Filesize

    40KB

  • memory/1740-41-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-42-0x000007FEF5B40000-0x000007FEF652C000-memory.dmp

    Filesize

    9.9MB