Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2025 07:47

General

  • Target

    7de50c6159948b94cc3c2017d8aa3710fbe926787e6e49c68e60c94c3e1b23ff.exe

  • Size

    1.6MB

  • MD5

    5b739d8dca9be435b84be34e96335a67

  • SHA1

    1c713e0fb9e6b20b88dc874d6a2f21725ade23a7

  • SHA256

    7de50c6159948b94cc3c2017d8aa3710fbe926787e6e49c68e60c94c3e1b23ff

  • SHA512

    d9eccd96a3dac5f499cd4bdd661f9db676c2249ed9bf3a4af12c305af7f819dc5736fbae889072fc3352a9eaddc97c1ed7a3a3544aa1d09a8b485351b563cb6a

  • SSDEEP

    24576:VeOCnoITBKtKUFIb99eESRh0ME23JMKOuTlqLoA6D6IVPx7JDSVXT5XOt4eSyaB:Vmy0V2ZMKOY31PxKXT5Xug1B

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7de50c6159948b94cc3c2017d8aa3710fbe926787e6e49c68e60c94c3e1b23ff.exe
    "C:\Users\Admin\AppData\Local\Temp\7de50c6159948b94cc3c2017d8aa3710fbe926787e6e49c68e60c94c3e1b23ff.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2816

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2816-0-0x000007FEF5433000-0x000007FEF5434000-memory.dmp

    Filesize

    4KB

  • memory/2816-1-0x00000000005E0000-0x0000000000614000-memory.dmp

    Filesize

    208KB

  • memory/2816-2-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2816-3-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2816-4-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2816-5-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2816-7-0x0000000001E30000-0x0000000001E3A000-memory.dmp

    Filesize

    40KB

  • memory/2816-8-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2816-6-0x0000000001E30000-0x0000000001E3A000-memory.dmp

    Filesize

    40KB

  • memory/2816-12-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2816-13-0x000007FEF5433000-0x000007FEF5434000-memory.dmp

    Filesize

    4KB

  • memory/2816-14-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2816-15-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2816-16-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2816-17-0x0000000001E30000-0x0000000001E3A000-memory.dmp

    Filesize

    40KB

  • memory/2816-18-0x0000000001E30000-0x0000000001E3A000-memory.dmp

    Filesize

    40KB

  • memory/2816-19-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2816-20-0x000007FEF5430000-0x000007FEF5E1C000-memory.dmp

    Filesize

    9.9MB