Analysis

  • max time kernel
    149s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    22-02-2022 21:03

General

  • Target

    0ae903ec33ad4f930697e461f869e86410dc4d22cf26de40f5775283c002d971.exe

  • Size

    664KB

  • MD5

    329d395b6edfc1c931bbd0c9dd8b5be5

  • SHA1

    d6cbbeaec3e3571acc01470b01ea4e926e9a4a50

  • SHA256

    0ae903ec33ad4f930697e461f869e86410dc4d22cf26de40f5775283c002d971

  • SHA512

    6ae1fb8aa6dd4fbbf0d70587bbf6ff291514ef33d2b4699d50a9ccac55b692a457a6d94dc7afca611d781d12da47c65c505314faf2015f34141639bcd263bff1

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ae903ec33ad4f930697e461f869e86410dc4d22cf26de40f5775283c002d971.exe
    "C:\Users\Admin\AppData\Local\Temp\0ae903ec33ad4f930697e461f869e86410dc4d22cf26de40f5775283c002d971.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3880

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3880-130-0x00000000746FE000-0x00000000746FF000-memory.dmp
    Filesize

    4KB

  • memory/3880-131-0x0000000000400000-0x00000000004AC000-memory.dmp
    Filesize

    688KB

  • memory/3880-132-0x0000000005240000-0x00000000057E4000-memory.dmp
    Filesize

    5.6MB

  • memory/3880-133-0x0000000004D30000-0x0000000004DC2000-memory.dmp
    Filesize

    584KB

  • memory/3880-134-0x0000000004E80000-0x0000000004E81000-memory.dmp
    Filesize

    4KB

  • memory/3880-135-0x0000000005190000-0x000000000519A000-memory.dmp
    Filesize

    40KB

  • memory/3880-136-0x0000000005110000-0x0000000005186000-memory.dmp
    Filesize

    472KB