Analysis

  • max time kernel
    137s
  • max time network
    50s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    13-07-2020 08:09

General

  • Target

    Z15L.exe

  • Size

    535KB

  • MD5

    8201a2b265f439d26d57f1956b82a1fb

  • SHA1

    1ef71a20564a1a6c26c4467fd10b24337cd1cc9c

  • SHA256

    d3e1f5cc557fedb2c060faa7f234f4a09ba408c428e1c2275b2e713e0bf68db7

  • SHA512

    7ebf6b7a31125d89d0c4a774d7b4e925a9a6c7ebd70961144f02d21e0a22cedd7163a0462843c4cb6e06f124814d427a0feed2b4e936465b43cc4fb6567666a2

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Z15L.exe
    "C:\Users\Admin\AppData\Local\Temp\Z15L.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads