Analysis
-
max time kernel
131s -
max time network
131s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
01-12-2021 08:20
Static task
static1
Behavioral task
behavioral1
Sample
304b4864421a6e2f8738293d33a22386.exe
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
304b4864421a6e2f8738293d33a22386.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
304b4864421a6e2f8738293d33a22386.exe
-
Size
654KB
-
MD5
304b4864421a6e2f8738293d33a22386
-
SHA1
8544125f97197ff0cc552dade97c894d258c89d0
-
SHA256
d9c6cc74736a6ffeb3dd869fc8db8c845d0300b6f3302c688a3b78a79f16cd13
-
SHA512
a6f914c62a81f4689992ad04da4a9e07ed541f211224552bacdaf06a533bb2a4a30201d7ab85eee951d6d1ef0237fadaee9183dde5975b67fe35da33544fd8e3
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
304b4864421a6e2f8738293d33a22386.exedescription pid process Token: SeDebugPrivilege 2704 304b4864421a6e2f8738293d33a22386.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2704-115-0x0000000000F80000-0x0000000000F81000-memory.dmpFilesize
4KB
-
memory/2704-117-0x0000000005DA0000-0x0000000005DA1000-memory.dmpFilesize
4KB
-
memory/2704-118-0x00000000058A0000-0x00000000058A1000-memory.dmpFilesize
4KB
-
memory/2704-119-0x0000000005940000-0x0000000005941000-memory.dmpFilesize
4KB
-
memory/2704-120-0x00000000058A0000-0x0000000005D9E000-memory.dmpFilesize
5.0MB