Analysis

  • max time kernel
    150s
  • max time network
    77s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    10-02-2025 15:28

General

  • Target

    029b88d7657a66d5dc1e0b26f4e3690acb750b7de1ceff00b9ce5d96dc576a40.exe

  • Size

    1.3MB

  • MD5

    5fbd2c38a7a0eb3e2b929d3e42979af7

  • SHA1

    90e96b193223368cbd50b30169d08541a630dc0f

  • SHA256

    029b88d7657a66d5dc1e0b26f4e3690acb750b7de1ceff00b9ce5d96dc576a40

  • SHA512

    e47f4e1dca193f52479958e49ca2d4c23d18b9d90fd69432d1c842fc1ddc9175bb4985e8caee8f7ec7bfcd3131ef8001c8a5d9a03bc4e33c92f6589de24db865

  • SSDEEP

    24576:QUiy8fkHcLMXk36ZgZx+gR1QWrNbGjWvAhkF6bJ7kDSl:ZiPfkyMUqZwxVBFGjW4SsV7R

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\029b88d7657a66d5dc1e0b26f4e3690acb750b7de1ceff00b9ce5d96dc576a40.exe
    "C:\Users\Admin\AppData\Local\Temp\029b88d7657a66d5dc1e0b26f4e3690acb750b7de1ceff00b9ce5d96dc576a40.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2072-0-0x000007FEF5A93000-0x000007FEF5A94000-memory.dmp

    Filesize

    4KB

  • memory/2072-1-0x0000000000240000-0x0000000000272000-memory.dmp

    Filesize

    200KB

  • memory/2072-2-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-3-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-4-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-5-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-8-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-10-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-11-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-12-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-13-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-29-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-30-0x000007FEF5A93000-0x000007FEF5A94000-memory.dmp

    Filesize

    4KB

  • memory/2072-31-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-32-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-33-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-34-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-35-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB

  • memory/2072-36-0x000007FEF5A90000-0x000007FEF647C000-memory.dmp

    Filesize

    9.9MB