Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    29-06-2020 07:54

General

  • Target

    df48230380a555ceab5ec604e55d84b862de9f36ba2b0216d3897acde146586e.exe

  • Size

    16KB

  • MD5

    7352238d0ab5436f20a4ef3e1a4a5ff3

  • SHA1

    f82a5f80b924913fb6be191dd6ee4a981477741f

  • SHA256

    df48230380a555ceab5ec604e55d84b862de9f36ba2b0216d3897acde146586e

  • SHA512

    58498c87a067d9f2a3f7062c8ce400aced9f17b1b08f86dbfab7f76e324615b66c6b34c269bec40233c9f5a6ef4c00535d9d916c75e8a05de820758a0b777a96

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df48230380a555ceab5ec604e55d84b862de9f36ba2b0216d3897acde146586e.exe
    "C:\Users\Admin\AppData\Local\Temp\df48230380a555ceab5ec604e55d84b862de9f36ba2b0216d3897acde146586e.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3104

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads