Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    31-07-2020 16:03

General

  • Target

    4eb0349360ac28e67c8fcdc0a7bdfa89.exe

  • Size

    639KB

  • MD5

    4eb0349360ac28e67c8fcdc0a7bdfa89

  • SHA1

    f96e71aab5845581a18b19410a0be379496cedd0

  • SHA256

    61f0cc39fa5610ea3e64197420fc7483be2dafce8c2fba24756a6dd3ea1e81a5

  • SHA512

    6928cd29f862657efe1c1f2798bb0b840b69866a9dcd65983e945d582bafd1403add255fb2276d5aaa5bd70c40e6f8b6be4bbc1e1df8c0ac586c96d14da3cffc

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4eb0349360ac28e67c8fcdc0a7bdfa89.exe
    "C:\Users\Admin\AppData\Local\Temp\4eb0349360ac28e67c8fcdc0a7bdfa89.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads