Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    11-01-2021 19:03

General

  • Target

    SuJFLtPM.exe

  • Size

    16KB

  • MD5

    fbdf4287d046c463794a71b9a01e8d33

  • SHA1

    b2734b24c3df3b6dbcc6b293d12528be46900726

  • SHA256

    dfda2a6482436d52c205dc4f8e33b9d8789204c967ac948f654ee04928639638

  • SHA512

    145bbe60b287fb8b47d4895d44724f646a1facf849ef108854d0dfe88d1a0d1ef42a4670ce1664fcdb25ba445dcd0812721b7ef25a139a3a06bc446659dbb973

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SuJFLtPM.exe
    "C:\Users\Admin\AppData\Local\Temp\SuJFLtPM.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1904

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1904-2-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp
    Filesize

    9.6MB

  • memory/1904-3-0x000007FEF5CB0000-0x000007FEF664D000-memory.dmp
    Filesize

    9.6MB