Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2025 10:39

General

  • Target

    dad593d6145837bdd2510095a51fe36e1d1862a71690e0e4df0b5b38380b9cb1.exe

  • Size

    1.3MB

  • MD5

    0fa587a965abc5def1f9beac7c755250

  • SHA1

    4e069ec82fd41dcc1bb6449474693aa26434fbef

  • SHA256

    dad593d6145837bdd2510095a51fe36e1d1862a71690e0e4df0b5b38380b9cb1

  • SHA512

    414d1094050bb8de72fcb6665410c0a7354e2ceea3c913959b75d9634161f96ad923e5293018b66a1936c6a14e17d2af8b609dcb8f23c6b1fa8fbbb9269f4681

  • SSDEEP

    24576:Si7+6O3GUHh3++9qSpQs/D9AENl0/13Yya3DSVXT5XuOJq:Sh3NHh3L9/D9A609I1EXT5X9Jq

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dad593d6145837bdd2510095a51fe36e1d1862a71690e0e4df0b5b38380b9cb1.exe
    "C:\Users\Admin\AppData\Local\Temp\dad593d6145837bdd2510095a51fe36e1d1862a71690e0e4df0b5b38380b9cb1.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2900-0-0x000007FEF5583000-0x000007FEF5584000-memory.dmp

    Filesize

    4KB

  • memory/2900-1-0x0000000000250000-0x0000000000284000-memory.dmp

    Filesize

    208KB

  • memory/2900-2-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2900-3-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2900-4-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2900-5-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2900-7-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2900-6-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2900-8-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2900-12-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2900-13-0x000007FEF5583000-0x000007FEF5584000-memory.dmp

    Filesize

    4KB

  • memory/2900-14-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2900-15-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2900-38-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2900-39-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2900-40-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2900-41-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

    Filesize

    9.9MB

  • memory/2900-42-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

    Filesize

    9.9MB