Analysis

  • max time kernel
    174s
  • max time network
    192s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29-01-2022 16:37

General

  • Target

    004936678c928e5945abc599e913e96f663fb81eef6e5d6970feac378181cccf.exe

  • Size

    102KB

  • MD5

    94d29dded4dfd920fc4153f18e82fc6c

  • SHA1

    57a35e324d60336b4bbff644c754bcc0b173c19b

  • SHA256

    004936678c928e5945abc599e913e96f663fb81eef6e5d6970feac378181cccf

  • SHA512

    149798b76a550a6070d4c97cf53c3445f3bc3a7899f25b5c8ccd20d85503c3888c872bafbe4d4ef26931267c54217dea56ea81d278e7585a73786b15a5dea8c7

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\004936678c928e5945abc599e913e96f663fb81eef6e5d6970feac378181cccf.exe
    "C:\Users\Admin\AppData\Local\Temp\004936678c928e5945abc599e913e96f663fb81eef6e5d6970feac378181cccf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3736-115-0x0000000001490000-0x0000000001491000-memory.dmp

    Filesize

    4KB