Analysis

  • max time kernel
    61s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    23-12-2020 14:30

General

  • Target

    ## HOW TO DECRYPT ##.exe

  • Size

    78KB

  • MD5

    55cb627f9925b52bd5ae0bc5e5188bcf

  • SHA1

    858c350062bde8644d89113697a1b9b38ec91714

  • SHA256

    2608e3aee2ca61701eb8b5281b9c9f25f84f40faf3210b2cdaa188d798345a3c

  • SHA512

    93d4d1528f7c13374e4e91aa6dcb9c0e2c1149b00ff15f43c0353bee568bd8287085e7ca7b5eadeaa015b4b2052c2462bec1598e595a98af847b2772e14549c3

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\## HOW TO DECRYPT ##.exe
    "C:\Users\Admin\AppData\Local\Temp\## HOW TO DECRYPT ##.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4068

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4068-2-0x0000000073E00000-0x00000000744EE000-memory.dmp
    Filesize

    6.9MB

  • memory/4068-3-0x0000000000B90000-0x0000000000B91000-memory.dmp
    Filesize

    4KB

  • memory/4068-5-0x0000000005A30000-0x0000000005A31000-memory.dmp
    Filesize

    4KB

  • memory/4068-6-0x0000000006B00000-0x0000000006B01000-memory.dmp
    Filesize

    4KB

  • memory/4068-7-0x000000000A540000-0x000000000A541000-memory.dmp
    Filesize

    4KB