Analysis

  • max time kernel
    18s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    22-07-2021 05:27

General

  • Target

    MPU702734-pdf.exe

  • Size

    29KB

  • MD5

    7ca4655dff0318fa097429f12c5f5c5a

  • SHA1

    d48404a0bed433fdec9868e57ef561c53e74a9e7

  • SHA256

    f3f681c71b259b83868bf64d9cbd877ddef4b78fb67b91e899e0d970e5e5de66

  • SHA512

    0bcaaedef0e707a56a773750c82b614da71148e531d1735989f62dcf5d4e78de7dd4c397201c481b7cca782ff9d356d00f7fdc673399c21d66a4fe6e0b4d0988

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MPU702734-pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\MPU702734-pdf.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:528
    • C:\Users\Admin\AppData\Local\Temp\MPU702734-pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\MPU702734-pdf.exe"
      2⤵
        PID:2900

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/528-114-0x0000000000A90000-0x0000000000A91000-memory.dmp
      Filesize

      4KB

    • memory/528-116-0x0000000005400000-0x0000000005401000-memory.dmp
      Filesize

      4KB

    • memory/528-117-0x0000000005380000-0x00000000053F6000-memory.dmp
      Filesize

      472KB

    • memory/528-118-0x0000000005DF0000-0x0000000005DF1000-memory.dmp
      Filesize

      4KB

    • memory/528-119-0x0000000005E10000-0x0000000005E17000-memory.dmp
      Filesize

      28KB

    • memory/528-120-0x0000000005EF0000-0x0000000005EF1000-memory.dmp
      Filesize

      4KB