Analysis

  • max time kernel
    122s
  • max time network
    154s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29-01-2022 18:19

General

  • Target

    17a1cec5b8ce358f8a0c43ac7a16292e2b455a79ba62aec1e24ac0a51427cf48.exe

  • Size

    125KB

  • MD5

    51c57b0366d0b71acf05b4df0afef52f

  • SHA1

    18fcd5ca1236e67c4526fb4b5e009be97bded8db

  • SHA256

    17a1cec5b8ce358f8a0c43ac7a16292e2b455a79ba62aec1e24ac0a51427cf48

  • SHA512

    b81b336ce8d9732307287e691fb6d678eab77a9a58423ee4c4ce6a5673a5bf26adbb6f4c282f867cad584c1b5ebf4c6c27ce530d3189b10a178ffe7adb5aaec6

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17a1cec5b8ce358f8a0c43ac7a16292e2b455a79ba62aec1e24ac0a51427cf48.exe
    "C:\Users\Admin\AppData\Local\Temp\17a1cec5b8ce358f8a0c43ac7a16292e2b455a79ba62aec1e24ac0a51427cf48.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2764-117-0x0000000002740000-0x0000000002741000-memory.dmp

    Filesize

    4KB