Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-02-2025 17:05

General

  • Target

    08fe2c7c35fb2862162a8fb4cc29660929650d2372fed16547d81d0a93a5086a.exe

  • Size

    1.6MB

  • MD5

    51791d8a0a4d93ac269f517c0695763b

  • SHA1

    f283bae4b61f465bcce34c8e2d049ae69459dfa0

  • SHA256

    08fe2c7c35fb2862162a8fb4cc29660929650d2372fed16547d81d0a93a5086a

  • SHA512

    40a2ccdc4902ef7bf20dd985402b2d18813cbe260396848428bce5b2fd5d383f1900e75076a6cbf1099aa2f36a09ba82147e3a1e639eda25deb906f531cfd049

  • SSDEEP

    24576:VeOCnoITBKtKUFIb99eESRh0ME23JMKOuTlqLoA6D6IVPx7JDSVXT5XOt4eSyaV:Vmy0V2ZMKOY31PxKXT5Xug1V

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08fe2c7c35fb2862162a8fb4cc29660929650d2372fed16547d81d0a93a5086a.exe
    "C:\Users\Admin\AppData\Local\Temp\08fe2c7c35fb2862162a8fb4cc29660929650d2372fed16547d81d0a93a5086a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2432

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2432-0-0x000007FEF5523000-0x000007FEF5524000-memory.dmp

    Filesize

    4KB

  • memory/2432-1-0x0000000001C80000-0x0000000001CB4000-memory.dmp

    Filesize

    208KB

  • memory/2432-2-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2432-3-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2432-4-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2432-6-0x0000000001CC0000-0x0000000001CCA000-memory.dmp

    Filesize

    40KB

  • memory/2432-7-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2432-5-0x0000000001CC0000-0x0000000001CCA000-memory.dmp

    Filesize

    40KB

  • memory/2432-11-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2432-34-0x000007FEF5523000-0x000007FEF5524000-memory.dmp

    Filesize

    4KB

  • memory/2432-35-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2432-36-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2432-37-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2432-38-0x0000000001CC0000-0x0000000001CCA000-memory.dmp

    Filesize

    40KB

  • memory/2432-39-0x0000000001CC0000-0x0000000001CCA000-memory.dmp

    Filesize

    40KB

  • memory/2432-40-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

    Filesize

    9.9MB

  • memory/2432-41-0x000007FEF5520000-0x000007FEF5F0C000-memory.dmp

    Filesize

    9.9MB