Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-11-2020 11:33
Static task
static1
Behavioral task
behavioral1
Sample
905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
-
Size
21KB
-
MD5
6fe3fb85216045fdf8186429c27458a7
-
SHA1
ef2c68d0b3edf3def5d90f1525fe87c2142e5710
-
SHA256
905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550
-
SHA512
d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exedescription pid process Token: SeDebugPrivilege 4632 905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4632-0-0x00007FF9C90F0000-0x00007FF9C9A90000-memory.dmpFilesize
9.6MB