Analysis

  • max time kernel
    15s
  • max time network
    119s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    21-07-2021 21:40

General

  • Target

    20377b9eaeb7b801d02a879e2575c727.exe

  • Size

    71KB

  • MD5

    20377b9eaeb7b801d02a879e2575c727

  • SHA1

    b8efd329640805a46e1d72c0842f33575f7585cf

  • SHA256

    df529e7fb2456c752fefb9b1733e1498d005f7616650bc2d6057582312b5adcc

  • SHA512

    d8e56d36e1fad808bc946bb2f9fbc6e1565659fe6293f16c4146c7f036dc91282dbbd4c3f9a186d7e80a94772e0c2ab75fa9d2a2e3929dc6765d1e17f90927e8

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20377b9eaeb7b801d02a879e2575c727.exe
    "C:\Users\Admin\AppData\Local\Temp\20377b9eaeb7b801d02a879e2575c727.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:996

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/996-114-0x0000000000C00000-0x0000000000C01000-memory.dmp
    Filesize

    4KB

  • memory/996-116-0x000000001B8C0000-0x000000001B8C2000-memory.dmp
    Filesize

    8KB