Analysis

  • max time kernel
    148s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-11-2020 15:43

General

  • Target

    T7TCr4JE.exe

  • Size

    16KB

  • MD5

    244ce85ec13ed9838b10269194d06f28

  • SHA1

    4f0aab03a01c37df602f1c67b9225a767969da5c

  • SHA256

    53899e8e2ac9722fa19c52bdd9db99cc8e45429b0f73959805ee52628fb38334

  • SHA512

    c4ef64da781e9b1ec48e5206c66228462e7208c325fef94602855fb4ff7b7091bf8a757e234c307783ce3da42e75e8b043a33e5e1ba66f4861f07e00ed5aa45d

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\T7TCr4JE.exe
    "C:\Users\Admin\AppData\Local\Temp\T7TCr4JE.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:728

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/728-0-0x00007FFD721D0000-0x00007FFD72B70000-memory.dmp
    Filesize

    9.6MB