Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2025 22:03

General

  • Target

    3f076eb14812016d9d5bba3a27e3f36972f58f0a282cac94b8c89d4bd846bde0.exe

  • Size

    1.6MB

  • MD5

    3c7947e1ffc09150873ab39dd32ed353

  • SHA1

    d9e1c8bc95505fe23e19bb72a4bb909a2938cd24

  • SHA256

    3f076eb14812016d9d5bba3a27e3f36972f58f0a282cac94b8c89d4bd846bde0

  • SHA512

    38f2ef691fcb60900f00be800f0d25a6ba423b9add780c428d4ac3c20fdb682e88bf9ebd242e1dabf07880b68c6da01fabc4bb30adef8e3f92bf8040f15ce6b2

  • SSDEEP

    24576:VeOCnoITBKtKUFIb99eESRh0ME23JMKOuTlqLoA6D6IVPx7JDSVXT5XOt4eSya9:Vmy0V2ZMKOY31PxKXT5Xug19

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f076eb14812016d9d5bba3a27e3f36972f58f0a282cac94b8c89d4bd846bde0.exe
    "C:\Users\Admin\AppData\Local\Temp\3f076eb14812016d9d5bba3a27e3f36972f58f0a282cac94b8c89d4bd846bde0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2004

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2004-0-0x000007FEF5463000-0x000007FEF5464000-memory.dmp

    Filesize

    4KB

  • memory/2004-1-0x0000000001DE0000-0x0000000001E14000-memory.dmp

    Filesize

    208KB

  • memory/2004-2-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2004-4-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2004-3-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2004-5-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2004-6-0x0000000002180000-0x000000000218A000-memory.dmp

    Filesize

    40KB

  • memory/2004-7-0x0000000002180000-0x000000000218A000-memory.dmp

    Filesize

    40KB

  • memory/2004-8-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2004-12-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2004-13-0x000007FEF5463000-0x000007FEF5464000-memory.dmp

    Filesize

    4KB

  • memory/2004-14-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2004-15-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2004-19-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2004-31-0x0000000002180000-0x000000000218A000-memory.dmp

    Filesize

    40KB

  • memory/2004-30-0x0000000002180000-0x000000000218A000-memory.dmp

    Filesize

    40KB

  • memory/2004-32-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB

  • memory/2004-39-0x000007FEF5460000-0x000007FEF5E4C000-memory.dmp

    Filesize

    9.9MB