Analysis

  • max time kernel
    165s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    20-03-2022 00:17

General

  • Target

    24056de7e83c92ee0e5b326a15ba25cc959a222d48b81eac6a9dae1783318f1d.exe

  • Size

    81KB

  • MD5

    1b0fd1b3b90c1dc0dc2ad39915308201

  • SHA1

    4fbfe7d597ffe743f378eae38c1109121e097e5f

  • SHA256

    24056de7e83c92ee0e5b326a15ba25cc959a222d48b81eac6a9dae1783318f1d

  • SHA512

    b57cdcb74cf0a61c6fbb59551001e4202ce2cc170bb78dfcaa53f9c41846c695855bd21937fb91ae326fb8a6d0579b0973c02446cb614f9dc2fee89bea9eb829

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24056de7e83c92ee0e5b326a15ba25cc959a222d48b81eac6a9dae1783318f1d.exe
    "C:\Users\Admin\AppData\Local\Temp\24056de7e83c92ee0e5b326a15ba25cc959a222d48b81eac6a9dae1783318f1d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3368

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3368-134-0x0000000074A20000-0x00000000751D0000-memory.dmp
    Filesize

    7.7MB

  • memory/3368-135-0x0000000000370000-0x000000000038A000-memory.dmp
    Filesize

    104KB

  • memory/3368-136-0x0000000004D40000-0x0000000004DDC000-memory.dmp
    Filesize

    624KB

  • memory/3368-137-0x00000000008C0000-0x00000000008C1000-memory.dmp
    Filesize

    4KB

  • memory/3368-138-0x0000000005590000-0x0000000005B34000-memory.dmp
    Filesize

    5.6MB

  • memory/3368-139-0x0000000000AB0000-0x0000000000B16000-memory.dmp
    Filesize

    408KB