Analysis

  • max time kernel
    23s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    23-05-2021 22:01

General

  • Target

    9D9A8BEECC8E6612D6BFB10D959AF3CE.exe

  • Size

    13KB

  • MD5

    9d9a8beecc8e6612d6bfb10d959af3ce

  • SHA1

    400392722dd43993b8f4ba7b8bcd55aa8be58ba1

  • SHA256

    9c8057521a53904ce86837434f6ca9075fea66d1c31914db6a6b49f68649191f

  • SHA512

    ab47d000c5bc715158e89ad1fcf6f11f72646524e0ce2be93b85eead82f4365459ae16e115a64e78961b1b1a08a4dc37341b4bb6c3c9eae558f417828407d302

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9D9A8BEECC8E6612D6BFB10D959AF3CE.exe
    "C:\Users\Admin\AppData\Local\Temp\9D9A8BEECC8E6612D6BFB10D959AF3CE.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:520

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/520-59-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/520-61-0x000000001A8F0000-0x000000001A8F2000-memory.dmp

    Filesize

    8KB

  • memory/520-62-0x000000001A8F6000-0x000000001A915000-memory.dmp

    Filesize

    124KB

  • memory/520-63-0x000000001A915000-0x000000001A916000-memory.dmp

    Filesize

    4KB