Analysis

  • max time kernel
    38s
  • max time network
    131s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    23-06-2021 17:05

General

  • Target

    8309BB41E97424572F1076F7F3152E7C.exe

  • Size

    9.6MB

  • MD5

    8309bb41e97424572f1076f7f3152e7c

  • SHA1

    3b88f14dddd90214e0907d4bc51b94f24dbab8b3

  • SHA256

    cb2516e6d3a85325c9c1495cf9b5b7db93d4b7cc4e4629f248512d0a028addb1

  • SHA512

    398ba4261da3bd0cd7c65850cf919063fb402e1703e6a51246fe45759efaec5897e68be54f95a4764f80f049e309f8a995a82b00bf266ec482af32155e79d4e9

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8309BB41E97424572F1076F7F3152E7C.exe
    "C:\Users\Admin\AppData\Local\Temp\8309BB41E97424572F1076F7F3152E7C.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3708

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3708-114-0x0000000000590000-0x0000000000591000-memory.dmp

    Filesize

    4KB

  • memory/3708-116-0x0000000005C70000-0x0000000005C71000-memory.dmp

    Filesize

    4KB

  • memory/3708-117-0x0000000005810000-0x0000000005811000-memory.dmp

    Filesize

    4KB

  • memory/3708-118-0x0000000003310000-0x0000000003311000-memory.dmp

    Filesize

    4KB

  • memory/3708-119-0x0000000005770000-0x0000000005C6E000-memory.dmp

    Filesize

    5.0MB