Analysis

  • max time kernel
    143s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    08-07-2020 07:16

General

  • Target

  • Size

    274KB

  • MD5

    49e12ea6bf08675717560b3d95b7ceba

  • SHA1

    c88150ee6a37128dd12e0a5649a0c0ce675fe74e

  • SHA256

    1690586a19f9ad9444e773c217ba6c1c57c77cff5ed0535dec7618526ad23dac

  • SHA512

    00995544624f59978cb9f4614fa9124552f5b53be0543ca4e54b53e782339ef0ccdd15e22ce1890f114a38bd04af57b11741ed2cf806d329c474914d38556533

Score
7/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    "C:\Users\Admin\AppData\Local\Temp\[email protected]"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:3656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads