Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    05-05-2021 17:41

General

  • Target

    acc686c584f0e579fc51cab444ecb3fd.exe

  • Size

    128KB

  • MD5

    acc686c584f0e579fc51cab444ecb3fd

  • SHA1

    c98d4ee0689d0426c5e18187c49fcf9900c1e56f

  • SHA256

    9f3d31eae0e7a98951701870f892aedf680156bf91f472fd54224b28b2eb0c08

  • SHA512

    7a8a1c30c8197f441611dafed16943a4d21cb1826f412528ba1d1e9d217ec84c6ac42e2b9a7603a1a12fb25f8f54d8a9015609e8b220faa4b2f9136a28daecb6

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acc686c584f0e579fc51cab444ecb3fd.exe
    "C:\Users\Admin\AppData\Local\Temp\acc686c584f0e579fc51cab444ecb3fd.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/736-114-0x0000000000730000-0x0000000000731000-memory.dmp
    Filesize

    4KB

  • memory/736-116-0x00000000054B0000-0x00000000054B1000-memory.dmp
    Filesize

    4KB

  • memory/736-117-0x0000000004F40000-0x0000000004F41000-memory.dmp
    Filesize

    4KB

  • memory/736-118-0x0000000004FA0000-0x0000000004FA1000-memory.dmp
    Filesize

    4KB

  • memory/736-119-0x0000000004FE0000-0x0000000004FE1000-memory.dmp
    Filesize

    4KB

  • memory/736-120-0x0000000004EA0000-0x00000000054A6000-memory.dmp
    Filesize

    6.0MB

  • memory/736-121-0x0000000005250000-0x0000000005251000-memory.dmp
    Filesize

    4KB