Analysis
-
max time kernel
61s -
max time network
124s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
23-12-2020 14:30
Static task
static1
Behavioral task
behavioral1
Sample
## HOW TO DECRYPT ##.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
## HOW TO DECRYPT ##.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
## HOW TO DECRYPT ##.exe
-
Size
78KB
-
MD5
55cb627f9925b52bd5ae0bc5e5188bcf
-
SHA1
858c350062bde8644d89113697a1b9b38ec91714
-
SHA256
2608e3aee2ca61701eb8b5281b9c9f25f84f40faf3210b2cdaa188d798345a3c
-
SHA512
93d4d1528f7c13374e4e91aa6dcb9c0e2c1149b00ff15f43c0353bee568bd8287085e7ca7b5eadeaa015b4b2052c2462bec1598e595a98af847b2772e14549c3
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
## HOW TO DECRYPT ##.exedescription pid process Token: SeDebugPrivilege 4068 ## HOW TO DECRYPT ##.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4068-2-0x0000000073E00000-0x00000000744EE000-memory.dmpFilesize
6.9MB
-
memory/4068-3-0x0000000000B90000-0x0000000000B91000-memory.dmpFilesize
4KB
-
memory/4068-5-0x0000000005A30000-0x0000000005A31000-memory.dmpFilesize
4KB
-
memory/4068-6-0x0000000006B00000-0x0000000006B01000-memory.dmpFilesize
4KB
-
memory/4068-7-0x000000000A540000-0x000000000A541000-memory.dmpFilesize
4KB