Analysis

  • max time kernel
    11s
  • max time network
    119s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    15-03-2021 09:51

General

  • Target

    0b1551c0bef2ec2f87a7e3d84be6a388c7ce52ca9d2c4f791939e41a3ecffd16.exe

  • Size

    141KB

  • MD5

    e5e56f9374a5a6dd331a0f57883bcbb5

  • SHA1

    86ae05396644baef2ddc112c0485af1f170c5bfb

  • SHA256

    0b1551c0bef2ec2f87a7e3d84be6a388c7ce52ca9d2c4f791939e41a3ecffd16

  • SHA512

    3cd12ee34d28125fc82082c5b91dc82ff27069c9d21766f82fc26f1fb5487de8e63f10c751f9ae211c6ea08c47e23ed3fc2925525038ac5796a447395a248941

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b1551c0bef2ec2f87a7e3d84be6a388c7ce52ca9d2c4f791939e41a3ecffd16.exe
    "C:\Users\Admin\AppData\Local\Temp\0b1551c0bef2ec2f87a7e3d84be6a388c7ce52ca9d2c4f791939e41a3ecffd16.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3932-2-0x00007FF81EAB0000-0x00007FF81F450000-memory.dmp

    Filesize

    9.6MB

  • memory/3932-3-0x0000000002DB0000-0x0000000002DB2000-memory.dmp

    Filesize

    8KB