Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    07-02-2025 06:06

General

  • Target

    abd1c3f6b6b95655cb88d50a740fcb033edba7cb33bb721255246ba3892f9fe8.exe

  • Size

    1.3MB

  • MD5

    8f18ca65df4d27fb69ec3079133b0efa

  • SHA1

    4a9b88265865d0ff78f94d45e080f7b4529ff642

  • SHA256

    abd1c3f6b6b95655cb88d50a740fcb033edba7cb33bb721255246ba3892f9fe8

  • SHA512

    b2e90a76abdd82122c5be299104ee499943413396fe67b7b2493304f4090dd0b6cd51b38e84eda6bdd8fdbca480474a0bd66f6d9a1e8f7f1dac97c47be0f4042

  • SSDEEP

    24576:r2qLfk7bTs2/PwjKYR8ASIBwhWODDSIQXbJ7W:KpbTv/Yr8xo6QXV7W

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abd1c3f6b6b95655cb88d50a740fcb033edba7cb33bb721255246ba3892f9fe8.exe
    "C:\Users\Admin\AppData\Local\Temp\abd1c3f6b6b95655cb88d50a740fcb033edba7cb33bb721255246ba3892f9fe8.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2764

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2764-0-0x000007FEF6443000-0x000007FEF6444000-memory.dmp

    Filesize

    4KB

  • memory/2764-1-0x0000000000340000-0x000000000037E000-memory.dmp

    Filesize

    248KB

  • memory/2764-2-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2764-3-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2764-4-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2764-7-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2764-9-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2764-10-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2764-11-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2764-30-0x000007FEF6443000-0x000007FEF6444000-memory.dmp

    Filesize

    4KB

  • memory/2764-31-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2764-32-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2764-33-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2764-34-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2764-35-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2764-36-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB

  • memory/2764-37-0x000007FEF6440000-0x000007FEF6E2C000-memory.dmp

    Filesize

    9.9MB