Analysis

  • max time kernel
    137s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    22-02-2022 02:31

General

  • Target

    5a604a8f0e72f3bf7901b7b67f881031a402ab8072269c00233a554df548f54d.exe

  • Size

    2.9MB

  • MD5

    9502d64e8f8c0f50127e2a7263596891

  • SHA1

    23006c877ccc883460497ad35df82e64f338cfc9

  • SHA256

    5a604a8f0e72f3bf7901b7b67f881031a402ab8072269c00233a554df548f54d

  • SHA512

    92ad471a82942f513ea2703623e734a3e2c8d740a52de0abf23c6f78a128f8a6bac1516fae26ba05ccfbab24cb32a37df5d3803bd3bd2aad7400fa48fb19c318

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a604a8f0e72f3bf7901b7b67f881031a402ab8072269c00233a554df548f54d.exe
    "C:\Users\Admin\AppData\Local\Temp\5a604a8f0e72f3bf7901b7b67f881031a402ab8072269c00233a554df548f54d.exe"
    1⤵
      PID:3544
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1576

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1576-133-0x0000017D7CA20000-0x0000017D7CA30000-memory.dmp

      Filesize

      64KB

    • memory/1576-134-0x0000017D7CA80000-0x0000017D7CA90000-memory.dmp

      Filesize

      64KB

    • memory/1576-135-0x0000017D7F150000-0x0000017D7F154000-memory.dmp

      Filesize

      16KB