Resubmissions

19-11-2020 17:05

201119-8eskjxmebj 10

19-11-2020 17:03

201119-pp61nvsrj2 10

19-11-2020 17:02

201119-6zqlez2lpn 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-11-2020 17:02

General

  • Target

    iLu731bW.exe

  • Size

    17KB

  • MD5

    8f248e320706f07dcbfe9eb766508bbf

  • SHA1

    5c4ecc286ba3b00309d4abcec900eff775ae76de

  • SHA256

    0c00b32af72a76cebfff85259e60a8f4aea66e93f198774dc370f5713a53fe00

  • SHA512

    188e47c519ab0ef52dd2e599302b33195fef3f8a68346f1f91f0671de23b16d4e0bb21b181a2dd158e42ade1139ab8ba6027b2d912ab3acbee34d53b3fffdc8f

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\iLu731bW.exe
    "C:\Users\Admin\AppData\Local\Temp\iLu731bW.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:948

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/948-0-0x00007FFA6B350000-0x00007FFA6BCF0000-memory.dmp
    Filesize

    9.6MB