Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 19:03

General

  • Target

    6575c2c85ab78258649bee9bb9d3f440f4b5e80fea7318e91551ae776f3c5667.exe

  • Size

    1.6MB

  • MD5

    44b365d51aaa300bbe3e6fa4f4fb4022

  • SHA1

    360e2b7bfa1fc479597856f937a39816261cbdc8

  • SHA256

    6575c2c85ab78258649bee9bb9d3f440f4b5e80fea7318e91551ae776f3c5667

  • SHA512

    505a5e2ba13147a84b1ddb16b51a1faecb2103de8c93598167db6c0b4407eb49d675048e71a4f37f8610be8d4f7177df9c4a7070ccc065b17e697e88f26e5295

  • SSDEEP

    24576:r0yOdKnqj9MNrOoThmBZTsl3WaPECkDtGQjnEd7DSVXT5X1hnD:gSqj9MxOt83J/kwonPXT5X1hD

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6575c2c85ab78258649bee9bb9d3f440f4b5e80fea7318e91551ae776f3c5667.exe
    "C:\Users\Admin\AppData\Local\Temp\6575c2c85ab78258649bee9bb9d3f440f4b5e80fea7318e91551ae776f3c5667.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1740-0-0x000007FEF5A63000-0x000007FEF5A64000-memory.dmp

    Filesize

    4KB

  • memory/1740-1-0x0000000000440000-0x0000000000474000-memory.dmp

    Filesize

    208KB

  • memory/1740-2-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-3-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-4-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-5-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-6-0x0000000000490000-0x000000000049A000-memory.dmp

    Filesize

    40KB

  • memory/1740-8-0x0000000000490000-0x000000000049A000-memory.dmp

    Filesize

    40KB

  • memory/1740-7-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-12-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-16-0x000007FEF5A63000-0x000007FEF5A64000-memory.dmp

    Filesize

    4KB

  • memory/1740-17-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-18-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-34-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-38-0x0000000000490000-0x000000000049A000-memory.dmp

    Filesize

    40KB

  • memory/1740-39-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/1740-40-0x0000000000490000-0x000000000049A000-memory.dmp

    Filesize

    40KB

  • memory/1740-44-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB