Analysis

  • max time kernel
    140s
  • max time network
    175s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29-01-2022 17:19

General

  • Target

    84fb5d99db36d869cf03b6b3c559fa976d0ea17e112e91596ddc0b0079a6b2e0.exe

  • Size

    177KB

  • MD5

    5a6bec1a9c38f6857525cca40f64b2ed

  • SHA1

    7b930d3516d1396a4f374ee30339e2003714e51a

  • SHA256

    84fb5d99db36d869cf03b6b3c559fa976d0ea17e112e91596ddc0b0079a6b2e0

  • SHA512

    463df2bc985d32e852c6ad036cd1e5c403e188662ff9dde34037abf7c92b861c638411b53cf028ff267568244b145f2ec1dd015733c532c0d214c510d19f33b6

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84fb5d99db36d869cf03b6b3c559fa976d0ea17e112e91596ddc0b0079a6b2e0.exe
    "C:\Users\Admin\AppData\Local\Temp\84fb5d99db36d869cf03b6b3c559fa976d0ea17e112e91596ddc0b0079a6b2e0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3468-115-0x0000000002380000-0x0000000002381000-memory.dmp

    Filesize

    4KB