Analysis

  • max time kernel
    165s
  • max time network
    186s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29-01-2022 17:08

General

  • Target

    338920c50a0fbccf537f07c78eaaa0a8665b96131bedc107a74be6124a06d370.exe

  • Size

    89KB

  • MD5

    82377fcf288e9db675ab24cbf76ea032

  • SHA1

    c0ab9e722ebab024697c3ac61b8a3d26c011fb49

  • SHA256

    338920c50a0fbccf537f07c78eaaa0a8665b96131bedc107a74be6124a06d370

  • SHA512

    0f325e93f13c0b2a74c0db3bf0f19606c00ba730d28ff9e9204baf119a6d25fdb3e4a6ee9a5d87e50e3229cd99cde788b5550b8f34a61e160411a6db919fd878

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\338920c50a0fbccf537f07c78eaaa0a8665b96131bedc107a74be6124a06d370.exe
    "C:\Users\Admin\AppData\Local\Temp\338920c50a0fbccf537f07c78eaaa0a8665b96131bedc107a74be6124a06d370.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3656

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3656-117-0x00000000011D0000-0x000000000127E000-memory.dmp

    Filesize

    696KB