Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    05-05-2021 17:41

General

  • Target

    acc686c584f0e579fc51cab444ecb3fd.exe

  • Size

    128KB

  • MD5

    acc686c584f0e579fc51cab444ecb3fd

  • SHA1

    c98d4ee0689d0426c5e18187c49fcf9900c1e56f

  • SHA256

    9f3d31eae0e7a98951701870f892aedf680156bf91f472fd54224b28b2eb0c08

  • SHA512

    7a8a1c30c8197f441611dafed16943a4d21cb1826f412528ba1d1e9d217ec84c6ac42e2b9a7603a1a12fb25f8f54d8a9015609e8b220faa4b2f9136a28daecb6

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acc686c584f0e579fc51cab444ecb3fd.exe
    "C:\Users\Admin\AppData\Local\Temp\acc686c584f0e579fc51cab444ecb3fd.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:768

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/768-60-0x0000000001050000-0x0000000001051000-memory.dmp
    Filesize

    4KB

  • memory/768-62-0x0000000000750000-0x0000000000751000-memory.dmp
    Filesize

    4KB