Analysis

  • max time kernel
    102s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    12-01-2022 11:47

General

  • Target

    5d33fd8f8ccea2910f1c0139e788b01c2fd3418f3956452a6db7a8aefeebc915.exe

  • Size

    1.4MB

  • MD5

    d66ffec81fd167adfb0505744f4df31e

  • SHA1

    7e9fbbf1d04316334ee46cfa923330dc63b3155b

  • SHA256

    5d33fd8f8ccea2910f1c0139e788b01c2fd3418f3956452a6db7a8aefeebc915

  • SHA512

    227a7f30d8e02460c6a5798b26edc60e3fead6059407287fe696f5bcc63a3e4aab43f7b5e58ef6f26c4498cbad50371af3b3e302c8c3cf9dd90d8302072a3a84

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d33fd8f8ccea2910f1c0139e788b01c2fd3418f3956452a6db7a8aefeebc915.exe
    "C:\Users\Admin\AppData\Local\Temp\5d33fd8f8ccea2910f1c0139e788b01c2fd3418f3956452a6db7a8aefeebc915.exe"
    1⤵
    • Drops startup file
    • Suspicious use of AdjustPrivilegeToken
    PID:4160

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads