Analysis
-
max time kernel
132s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
24-11-2021 11:00
Static task
static1
Behavioral task
behavioral1
Sample
versions.exe
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
versions.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
versions.exe
-
Size
1.0MB
-
MD5
e40c85fb0613efb7c73b93d51a72cda5
-
SHA1
8db384a16df0c904d09e11577640b422355983d2
-
SHA256
fc738d6f2c037f7fa3f40e362d99013664e4e0fc2ef54d61e1d2c4156e07ad50
-
SHA512
046fe8316d680df22914b1a13c27efd5a877f7c36183ab25a5723d6bb412e7419d1e4122a6281db09a285b20310b9bbcddb280b6384efb9a712446da94cf2d49
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
versions.exedescription pid process Token: SeDebugPrivilege 4036 versions.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4036-115-0x0000000000D30000-0x0000000000D31000-memory.dmpFilesize
4KB
-
memory/4036-117-0x0000000005710000-0x0000000005711000-memory.dmpFilesize
4KB
-
memory/4036-118-0x0000000005CB0000-0x0000000005CB1000-memory.dmpFilesize
4KB
-
memory/4036-119-0x00000000057B0000-0x00000000057B1000-memory.dmpFilesize
4KB
-
memory/4036-120-0x00000000057B0000-0x0000000005CAE000-memory.dmpFilesize
5.0MB