Analysis

  • max time kernel
    161s
  • max time network
    170s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    29/01/2022, 20:07

General

  • Target

    191be51494ba626d039470f78dc140b41c3d81ff71dd069ef118b5a8c76b0714.exe

  • Size

    106KB

  • MD5

    6746c430f978d0bc9bbecff87c651fa2

  • SHA1

    0edc71cc01ec8d16aeddf0c807bb696966c83266

  • SHA256

    191be51494ba626d039470f78dc140b41c3d81ff71dd069ef118b5a8c76b0714

  • SHA512

    4f459b790e6b58eaf1a9550c95f87cb4f73a1c0e32dc6ce61ed5686c706f602b024d1e414bdbd4724d46e17e82da110f55ca5cbc8e2fdc33138e161e1ef40ec6

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\191be51494ba626d039470f78dc140b41c3d81ff71dd069ef118b5a8c76b0714.exe
    "C:\Users\Admin\AppData\Local\Temp\191be51494ba626d039470f78dc140b41c3d81ff71dd069ef118b5a8c76b0714.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3560-118-0x00000000016D0000-0x00000000016D1000-memory.dmp

    Filesize

    4KB