Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-03-2021 18:19
Static task
static1
Behavioral task
behavioral1
Sample
49cc3c09_extracted.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
49cc3c09_extracted.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
49cc3c09_extracted.exe
-
Size
127KB
-
MD5
5523e663cf4697857df93a9bd262f12a
-
SHA1
e7214f499dffac1125ad423de465b4d5289954b3
-
SHA256
23225f2d86003f21a827b2e08b4935dd203563013963f48ccc4ce6d026a5b06c
-
SHA512
ba3cca366526796b957b606aa97d4d954c7f2ea6739e7b4b8c642a0df160f712633ba0b358c586999ec5c935d453f6dc54fe468f956e581b5dc14e1cd8d3bc61
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
49cc3c09_extracted.exedescription pid process Token: SeDebugPrivilege 1212 49cc3c09_extracted.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1212-2-0x0000000073290000-0x000000007397E000-memory.dmpFilesize
6.9MB
-
memory/1212-3-0x0000000000010000-0x0000000000011000-memory.dmpFilesize
4KB
-
memory/1212-5-0x0000000004D80000-0x0000000004D81000-memory.dmpFilesize
4KB
-
memory/1212-6-0x0000000004830000-0x0000000004831000-memory.dmpFilesize
4KB
-
memory/1212-7-0x0000000004890000-0x0000000004891000-memory.dmpFilesize
4KB
-
memory/1212-8-0x00000000048D0000-0x00000000048D1000-memory.dmpFilesize
4KB
-
memory/1212-9-0x0000000004980000-0x0000000004981000-memory.dmpFilesize
4KB
-
memory/1212-10-0x0000000004B40000-0x0000000004B41000-memory.dmpFilesize
4KB