Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2025 06:44

General

  • Target

    a448793126f4fbeb82e12d005bcad689a4ed4687e9d1fec6254f3f2aaa585e93.exe

  • Size

    1.4MB

  • MD5

    1b7842a5be879b376a1690cd432c92db

  • SHA1

    ee9791e503f19d57fc872e517f3fe840f0280361

  • SHA256

    a448793126f4fbeb82e12d005bcad689a4ed4687e9d1fec6254f3f2aaa585e93

  • SHA512

    3f80f727ceb472515b7c628dbee589ca2d6473aedf9ce3477dc584656cb83766b7b1dd0f0e6315ee5e1f79798a5309e6871ea274c55888ac61a36465e4caad62

  • SSDEEP

    24576:xPuw4Etx4IpYOi24wvnwqNwaeb9IXSd+vykvpDSxcAbJ7Y:AwD4IpiXwvwqpeb9IXSsv5vlAV7Y

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a448793126f4fbeb82e12d005bcad689a4ed4687e9d1fec6254f3f2aaa585e93.exe
    "C:\Users\Admin\AppData\Local\Temp\a448793126f4fbeb82e12d005bcad689a4ed4687e9d1fec6254f3f2aaa585e93.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:804

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/804-0-0x000007FEF5193000-0x000007FEF5194000-memory.dmp

    Filesize

    4KB

  • memory/804-1-0x0000000000140000-0x000000000017E000-memory.dmp

    Filesize

    248KB

  • memory/804-2-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-3-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-4-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-5-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-9-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-10-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-11-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-12-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-13-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-14-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-37-0x000007FEF5193000-0x000007FEF5194000-memory.dmp

    Filesize

    4KB

  • memory/804-38-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-39-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-40-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-41-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-42-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-43-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB

  • memory/804-44-0x000007FEF5190000-0x000007FEF5B7C000-memory.dmp

    Filesize

    9.9MB