Analysis

  • max time kernel
    169s
  • max time network
    182s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29-01-2022 17:07

General

  • Target

    f847f12ac1196ea30fd0e9bba5e270853f10db21221a4e463a3050b1bdac653c.exe

  • Size

    59KB

  • MD5

    8317bb3d192c4495507a5945f27705af

  • SHA1

    2eab604f0ff183191afbf37cd55de32542b15e47

  • SHA256

    f847f12ac1196ea30fd0e9bba5e270853f10db21221a4e463a3050b1bdac653c

  • SHA512

    6f70bb125ff4eb544db824915f06e3f90cb56939f3ca460edaf251998d52d23919f774fdcdb08ffeb323aaa2a9de709302fb824a5373b9fc5b7418c445de3e28

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f847f12ac1196ea30fd0e9bba5e270853f10db21221a4e463a3050b1bdac653c.exe
    "C:\Users\Admin\AppData\Local\Temp\f847f12ac1196ea30fd0e9bba5e270853f10db21221a4e463a3050b1bdac653c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2480

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2480-118-0x0000000001090000-0x0000000001091000-memory.dmp

    Filesize

    4KB