Analysis

  • max time kernel
    161s
  • max time network
    172s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29-01-2022 18:58

General

  • Target

    50de9dfa7fda82584acafb9ef9ed816587316006865092a00c56b4b3177c2786.exe

  • Size

    89KB

  • MD5

    92f78a182faf26550d6fab2d9ec0692d

  • SHA1

    3abd37f20fa74462f4e49d24b38e33889da22a63

  • SHA256

    50de9dfa7fda82584acafb9ef9ed816587316006865092a00c56b4b3177c2786

  • SHA512

    b5888ba00a5f38c6927a13ab5ccd809243b9fc3e3ab3a4ab9ddc93ce9dc1515ea2cbf3d6974cca3a455ec99a61f9da2aa76a2aed21d434b5349fbc8e332bd521

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50de9dfa7fda82584acafb9ef9ed816587316006865092a00c56b4b3177c2786.exe
    "C:\Users\Admin\AppData\Local\Temp\50de9dfa7fda82584acafb9ef9ed816587316006865092a00c56b4b3177c2786.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/516-116-0x0000000003040000-0x0000000003041000-memory.dmp

    Filesize

    4KB