Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-11-2020 11:48

General

  • Target

    72829ad3cf601d5bd7e38cddd56781bbad95c83df8d4eaae523b04c064fecaf1.exe

  • Size

    16KB

  • MD5

    5f75a01d12fb1f7a8dea594144711c9b

  • SHA1

    29cdcd15dde5673ff4cc81f6fb5e1ebacb043549

  • SHA256

    72829ad3cf601d5bd7e38cddd56781bbad95c83df8d4eaae523b04c064fecaf1

  • SHA512

    09b1448d4c1f23b1ec72296e697ea0c92faa55e8a3ef47ff0663564153d25144475bc671fa68b612ef3a936629734f945b2b348f88c6ae251790590ef5bc9388

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72829ad3cf601d5bd7e38cddd56781bbad95c83df8d4eaae523b04c064fecaf1.exe
    "C:\Users\Admin\AppData\Local\Temp\72829ad3cf601d5bd7e38cddd56781bbad95c83df8d4eaae523b04c064fecaf1.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4760-0-0x00007FFBE4670000-0x00007FFBE5010000-memory.dmp
    Filesize

    9.6MB