Resubmissions

23-12-2021 18:27

211223-w315csccej 10

23-12-2021 18:26

211223-w3h9jsccdq 1

22-12-2021 14:59

211222-sc3zgsgcgr 10

Analysis

  • max time kernel
    17s
  • max time network
    22s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    23-12-2021 18:26

General

  • Target

    4b6a6c7ec55b989c2c3fbf8f637b1d465a512ebd.exe

  • Size

    2.3MB

  • MD5

    cf11336d198c7034cb4e2a28c04d8898

  • SHA1

    50363fb0351f85d10faa9fd2729129f8753ab60f

  • SHA256

    892fe797710cbdda052f494e1979a339c14f96220d3d1a7c51d4f28ef47385de

  • SHA512

    a35a642a5aaa42b446b480ae63b9cddf3da4ef3720e71e65092ac36c497956cff06587da171145e53b189cb0ff10b65925e21eeb7ba15c38ad8920533099a43c

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b6a6c7ec55b989c2c3fbf8f637b1d465a512ebd.exe
    "C:\Users\Admin\AppData\Local\Temp\4b6a6c7ec55b989c2c3fbf8f637b1d465a512ebd.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:64

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/64-115-0x0000000000F90000-0x00000000011EA000-memory.dmp
    Filesize

    2.4MB

  • memory/64-116-0x0000000000F90000-0x00000000011EA000-memory.dmp
    Filesize

    2.4MB

  • memory/64-117-0x0000000005C00000-0x0000000005C01000-memory.dmp
    Filesize

    4KB

  • memory/64-118-0x0000000006260000-0x0000000006482000-memory.dmp
    Filesize

    2.1MB

  • memory/64-119-0x0000000006520000-0x0000000006586000-memory.dmp
    Filesize

    408KB