Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2025 05:55

General

  • Target

    a5f1bdc34c66c5d5f9f39117ff4ca6e072d7beecf38c5bab4b655940aa8d23fb.exe

  • Size

    1.4MB

  • MD5

    841adbed75034506c34505d514385ccb

  • SHA1

    fcd92664756950d95183547fa596f4251162bce7

  • SHA256

    a5f1bdc34c66c5d5f9f39117ff4ca6e072d7beecf38c5bab4b655940aa8d23fb

  • SHA512

    25435852f29d5bfc92078186b76d5fe8542f618c350cf8572316658a463ba3f36f9579ea877af0104d683600adcfdb8220624fbdae2393fa3b4bb03347f8c943

  • SSDEEP

    24576:N9/QSW61N8Lqpgz7R0Ahn5nRQfbJ7MiYPDS/Y:OeyepURPh5nRQfV7K

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5f1bdc34c66c5d5f9f39117ff4ca6e072d7beecf38c5bab4b655940aa8d23fb.exe
    "C:\Users\Admin\AppData\Local\Temp\a5f1bdc34c66c5d5f9f39117ff4ca6e072d7beecf38c5bab4b655940aa8d23fb.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1892

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1892-0-0x000007FEF6163000-0x000007FEF6164000-memory.dmp

    Filesize

    4KB

  • memory/1892-1-0x0000000001CC0000-0x0000000001CF2000-memory.dmp

    Filesize

    200KB

  • memory/1892-2-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-3-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-4-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-5-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-6-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-11-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-10-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-12-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-28-0x000007FEF6163000-0x000007FEF6164000-memory.dmp

    Filesize

    4KB

  • memory/1892-29-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-30-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-31-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-32-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-33-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-34-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB

  • memory/1892-35-0x000007FEF6160000-0x000007FEF6B4C000-memory.dmp

    Filesize

    9.9MB