Analysis

  • max time kernel
    12s
  • max time network
    116s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    17-08-2021 09:00

General

  • Target

    PO NO. P0008005.exe

  • Size

    8KB

  • MD5

    1e621a8a257d325510d24f67ce352123

  • SHA1

    f32e0824226e0e9d387f56c3f05f3d64481005dd

  • SHA256

    12a978875dc90e03cbb76d024222abfdc8296ed675fca2e17ca6447ce7bf0080

  • SHA512

    29a310a4d3cb27dedd7d2737e9585ae82b5b2cd647b15a62253e6ddcad9ea97a1170cb9f1a87042fdba351591f1c3a9aac6d2e9d4aef21d0b10a9bdfbebbde92

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO NO. P0008005.exe
    "C:\Users\Admin\AppData\Local\Temp\PO NO. P0008005.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3736
    • C:\Users\Admin\AppData\Local\Temp\PO NO. P0008005.exe
      "C:\Users\Admin\AppData\Local\Temp\PO NO. P0008005.exe"
      2⤵
        PID:3856

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3736-114-0x0000000000660000-0x0000000000661000-memory.dmp

      Filesize

      4KB

    • memory/3736-116-0x0000000005510000-0x0000000005511000-memory.dmp

      Filesize

      4KB

    • memory/3736-117-0x0000000004FF0000-0x0000000004FF1000-memory.dmp

      Filesize

      4KB

    • memory/3736-118-0x0000000002A30000-0x0000000002A39000-memory.dmp

      Filesize

      36KB

    • memory/3736-119-0x0000000005F30000-0x0000000005F31000-memory.dmp

      Filesize

      4KB