Analysis

  • max time kernel
    138s
  • max time network
    52s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    13-07-2020 11:03

General

  • Target

    PO_ 74317-1372020.bin.exe

  • Size

    1.1MB

  • MD5

    80e69b644da84346012b2b8e0b177d7d

  • SHA1

    1e379290040a1dab313a1760f5eb496d0d72b4a2

  • SHA256

    446f16b0c437e7be8d51c9365276bcee5cd8709f0a1bbb95fad2969c21e2db54

  • SHA512

    d1acf251288afbeb7a086350ae0d5b6e5f3249a559f419f73bdb98cd3794fcdf0c735b105966a79315215f303608008048602a41b5cde3d2b6d8252ccbd1f7a9

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO_ 74317-1372020.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\PO_ 74317-1372020.bin.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:1000

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads