Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 19:09

General

  • Target

    6575c2c85ab78258649bee9bb9d3f440f4b5e80fea7318e91551ae776f3c5667.exe

  • Size

    1.6MB

  • MD5

    44b365d51aaa300bbe3e6fa4f4fb4022

  • SHA1

    360e2b7bfa1fc479597856f937a39816261cbdc8

  • SHA256

    6575c2c85ab78258649bee9bb9d3f440f4b5e80fea7318e91551ae776f3c5667

  • SHA512

    505a5e2ba13147a84b1ddb16b51a1faecb2103de8c93598167db6c0b4407eb49d675048e71a4f37f8610be8d4f7177df9c4a7070ccc065b17e697e88f26e5295

  • SSDEEP

    24576:r0yOdKnqj9MNrOoThmBZTsl3WaPECkDtGQjnEd7DSVXT5X1hnD:gSqj9MxOt83J/kwonPXT5X1hD

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6575c2c85ab78258649bee9bb9d3f440f4b5e80fea7318e91551ae776f3c5667.exe
    "C:\Users\Admin\AppData\Local\Temp\6575c2c85ab78258649bee9bb9d3f440f4b5e80fea7318e91551ae776f3c5667.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2760-0-0x000007FEF6033000-0x000007FEF6034000-memory.dmp

    Filesize

    4KB

  • memory/2760-1-0x0000000001E00000-0x0000000001E34000-memory.dmp

    Filesize

    208KB

  • memory/2760-2-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2760-3-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2760-4-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2760-5-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2760-6-0x0000000001E30000-0x0000000001E3A000-memory.dmp

    Filesize

    40KB

  • memory/2760-7-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2760-11-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2760-30-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2760-31-0x000007FEF6033000-0x000007FEF6034000-memory.dmp

    Filesize

    4KB

  • memory/2760-32-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2760-33-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2760-34-0x0000000001E30000-0x0000000001E3A000-memory.dmp

    Filesize

    40KB

  • memory/2760-35-0x0000000001E30000-0x0000000001E3A000-memory.dmp

    Filesize

    40KB

  • memory/2760-36-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB

  • memory/2760-37-0x000007FEF6030000-0x000007FEF6A1C000-memory.dmp

    Filesize

    9.9MB