Resubmissions

10-11-2021 14:52

211110-r84p8aedej 10

09-11-2021 13:19

211109-qkrv3sfcg4 10

Analysis

  • max time kernel
    337s
  • max time network
    364s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    10-11-2021 14:52

General

  • Target

    30e6815ae008a8638c5b30460098904121e0b98c7e87784d950f1dc55aafec51.exe

  • Size

    8KB

  • MD5

    af6e236e2635e451927e7e99f159709a

  • SHA1

    ff5a827131c817a3bf95bb8b798b272101428618

  • SHA256

    30e6815ae008a8638c5b30460098904121e0b98c7e87784d950f1dc55aafec51

  • SHA512

    4b4fd1668211f7193c0b41bb014015f9502b2b75cb0237500c4754e3925d16f719e5154b5fe3cc328d867cfd3cd480802d6150140a48ba5a6ca407100b4b08e6

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30e6815ae008a8638c5b30460098904121e0b98c7e87784d950f1dc55aafec51.exe
    "C:\Users\Admin\AppData\Local\Temp\30e6815ae008a8638c5b30460098904121e0b98c7e87784d950f1dc55aafec51.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3692

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3692-118-0x0000000000C00000-0x0000000000C01000-memory.dmp
    Filesize

    4KB

  • memory/3692-120-0x000000001B770000-0x000000001B772000-memory.dmp
    Filesize

    8KB