Analysis

  • max time kernel
    17s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    15-04-2021 03:30

General

  • Target

    SKM_DD3350191107102300.exe

  • Size

    457KB

  • MD5

    a5e9d51ec0c2752e94ccbbf452100a5e

  • SHA1

    548a7e639da0966d1ecd1d4b92e6e527e8b62f53

  • SHA256

    891963a81a44a4539492b1c7aaa3c0ff69a758ecafa6968cd242dc62982cc446

  • SHA512

    8da6df239103cd6fcaea505e8a97eeb9ecf3338878513dbaa195bd82c82853f5d5aa5e599e43162e4f3d2429c3ab8610526595a8e35eb13ec1f2a3f5e0e5e74a

Score
7/10

Malware Config

Signatures

  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SKM_DD3350191107102300.exe
    "C:\Users\Admin\AppData\Local\Temp\SKM_DD3350191107102300.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/640-114-0x0000000000380000-0x0000000000381000-memory.dmp
    Filesize

    4KB

  • memory/640-116-0x00000000051C0000-0x00000000051C1000-memory.dmp
    Filesize

    4KB

  • memory/640-117-0x0000000004CC0000-0x0000000004CC1000-memory.dmp
    Filesize

    4KB

  • memory/640-118-0x0000000004D60000-0x0000000004D61000-memory.dmp
    Filesize

    4KB

  • memory/640-119-0x0000000004C50000-0x0000000004C51000-memory.dmp
    Filesize

    4KB

  • memory/640-121-0x0000000006190000-0x00000000061B1000-memory.dmp
    Filesize

    132KB

  • memory/640-122-0x0000000006250000-0x0000000006251000-memory.dmp
    Filesize

    4KB

  • memory/640-123-0x0000000006210000-0x0000000006211000-memory.dmp
    Filesize

    4KB

  • memory/640-124-0x0000000004C51000-0x0000000004C52000-memory.dmp
    Filesize

    4KB