Resubmissions

28-03-2022 02:35

220328-c3bd6acaaj 10

Analysis

  • max time kernel
    44s
  • max time network
    173s
  • platform
    windows10_x64
  • resource
    win10-20220223-en
  • submitted
    28-03-2022 02:35

General

  • Target

    a355a148d687d4d2c03c63f9d142fb3eb423700d46668345c17bfc83ece7100b.exe

  • Size

    1.8MB

  • MD5

    f7a312246c24032738a403e8cbeeb60e

  • SHA1

    fa2deea341f2320e4168e8ad26669fe4c904aa75

  • SHA256

    a355a148d687d4d2c03c63f9d142fb3eb423700d46668345c17bfc83ece7100b

  • SHA512

    6a4c9b4367535bbfd2d7c7d4b28edbeacd597b1da9d747e3a27898fea9de3143f73d610a34a2643c5dd8c4d3fd02652a044e88c5f274d0d56f6389953dff2005

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a355a148d687d4d2c03c63f9d142fb3eb423700d46668345c17bfc83ece7100b.exe
    "C:\Users\Admin\AppData\Local\Temp\a355a148d687d4d2c03c63f9d142fb3eb423700d46668345c17bfc83ece7100b.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3700

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3700-114-0x0000000000400000-0x00000000009A2000-memory.dmp
    Filesize

    5.6MB