Analysis

  • max time kernel
    156s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    19-03-2022 21:48

General

  • Target

    5920a3300107b7b1cf8c230a071a0e5f2f5ff5941a5c450ef911582a7ce08346.exe

  • Size

    9.7MB

  • MD5

    8e4f79bdc4355ac8ae615f669249ec7b

  • SHA1

    48cabf8d1645e0bb19e7a2d619342c02b19497b5

  • SHA256

    5920a3300107b7b1cf8c230a071a0e5f2f5ff5941a5c450ef911582a7ce08346

  • SHA512

    b8037b123c834d9460fba90678559e800962438bd30a2dcb213b4bad7cfa52929dfd2c8dff60b5f0a565c5558072de13f3c4245aa00bcc9b11b44d8c65ed7730

Score
1/10

Malware Config

Signatures

  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5920a3300107b7b1cf8c230a071a0e5f2f5ff5941a5c450ef911582a7ce08346.exe
    "C:\Users\Admin\AppData\Local\Temp\5920a3300107b7b1cf8c230a071a0e5f2f5ff5941a5c450ef911582a7ce08346.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1404
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
    • Modifies data under HKEY_USERS
    PID:4796

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1404-134-0x0000025ABD420000-0x0000025ABDDE6000-memory.dmp

    Filesize

    9.8MB

  • memory/1404-135-0x00007FFA2AD80000-0x00007FFA2B841000-memory.dmp

    Filesize

    10.8MB

  • memory/1404-136-0x0000025ABF950000-0x0000025ABF952000-memory.dmp

    Filesize

    8KB

  • memory/4796-137-0x0000029F65A90000-0x0000029F65AA0000-memory.dmp

    Filesize

    64KB

  • memory/4796-138-0x0000029F65AF0000-0x0000029F65B00000-memory.dmp

    Filesize

    64KB

  • memory/4796-139-0x0000029F680B0000-0x0000029F680B4000-memory.dmp

    Filesize

    16KB

  • memory/4796-140-0x0000029F68380000-0x0000029F68384000-memory.dmp

    Filesize

    16KB

  • memory/4796-141-0x0000029F68360000-0x0000029F68361000-memory.dmp

    Filesize

    4KB

  • memory/4796-142-0x0000029F680E0000-0x0000029F680E4000-memory.dmp

    Filesize

    16KB

  • memory/4796-143-0x0000029F680D0000-0x0000029F680D1000-memory.dmp

    Filesize

    4KB

  • memory/4796-144-0x0000029F680D0000-0x0000029F680D4000-memory.dmp

    Filesize

    16KB

  • memory/4796-145-0x0000029F65DD0000-0x0000029F65DD1000-memory.dmp

    Filesize

    4KB