Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-02-2025 11:02

General

  • Target

    9473e99a422863d45e5bf76928fad3c5d4ee8ff7b563fa890a36b8d0280fe515.exe

  • Size

    1.3MB

  • MD5

    6da19f3e15fc90c674deef51bcaeff60

  • SHA1

    1f81a62fb35903506325ed05be4f7774b2207f16

  • SHA256

    9473e99a422863d45e5bf76928fad3c5d4ee8ff7b563fa890a36b8d0280fe515

  • SHA512

    88d758f4eb9615c37abce54bdf6fd08f0b1326daee195a7a97ffe7d4d5e2573d07c888ee67d2734aa6afa5b70fa55bba8fe0784738a967822c878fb7d8afdf80

  • SSDEEP

    24576:Si7+6O3GUHh3++9qSpQs/D9AENl0/13Yya3DSVXT5XuOJc:Sh3NHh3L9/D9A609I1EXT5X9Jc

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9473e99a422863d45e5bf76928fad3c5d4ee8ff7b563fa890a36b8d0280fe515.exe
    "C:\Users\Admin\AppData\Local\Temp\9473e99a422863d45e5bf76928fad3c5d4ee8ff7b563fa890a36b8d0280fe515.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1364-0-0x000007FEF5973000-0x000007FEF5974000-memory.dmp

    Filesize

    4KB

  • memory/1364-1-0x0000000002240000-0x0000000002274000-memory.dmp

    Filesize

    208KB

  • memory/1364-2-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-3-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-4-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-5-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-7-0x0000000002280000-0x000000000228A000-memory.dmp

    Filesize

    40KB

  • memory/1364-6-0x0000000002280000-0x000000000228A000-memory.dmp

    Filesize

    40KB

  • memory/1364-8-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-12-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-32-0x000007FEF5973000-0x000007FEF5974000-memory.dmp

    Filesize

    4KB

  • memory/1364-33-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-37-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-38-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-39-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-40-0x0000000002280000-0x000000000228A000-memory.dmp

    Filesize

    40KB

  • memory/1364-41-0x0000000002280000-0x000000000228A000-memory.dmp

    Filesize

    40KB

  • memory/1364-42-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

    Filesize

    9.9MB

  • memory/1364-43-0x000007FEF5970000-0x000007FEF635C000-memory.dmp

    Filesize

    9.9MB