Analysis

  • max time kernel
    149s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220310-en
  • submitted
    30-03-2022 01:16

General

  • Target

    48386b5e10af37dba31932d2695083372589cf4eb0b2842eeaad610ffe39ec73.exe

  • Size

    512KB

  • MD5

    ffb297b8939840edc1e6f08e72190b4d

  • SHA1

    61913bb94988dbbc39639cefa19f008ab83dea88

  • SHA256

    48386b5e10af37dba31932d2695083372589cf4eb0b2842eeaad610ffe39ec73

  • SHA512

    32a2f2a4c3c64e436e342993004bbfd604e96dff5a306e648db73762471ac2bd4a0b928eecd2649852916f8dd020d9c3d10b752dd4c862b2e56a6a2a4aa9af10

Score
1/10

Malware Config

Signatures

  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48386b5e10af37dba31932d2695083372589cf4eb0b2842eeaad610ffe39ec73.exe
    "C:\Users\Admin\AppData\Local\Temp\48386b5e10af37dba31932d2695083372589cf4eb0b2842eeaad610ffe39ec73.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4328
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
    1⤵
    • Modifies data under HKEY_USERS
    PID:824

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4328-134-0x0000000006450000-0x0000000006474000-memory.dmp
    Filesize

    144KB

  • memory/4328-135-0x00000000064C0000-0x00000000064F2000-memory.dmp
    Filesize

    200KB

  • memory/4328-136-0x0000000000400000-0x00000000046E1000-memory.dmp
    Filesize

    66.9MB

  • memory/4328-137-0x0000000008E50000-0x00000000093F4000-memory.dmp
    Filesize

    5.6MB

  • memory/4328-138-0x0000000009400000-0x0000000009A18000-memory.dmp
    Filesize

    6.1MB

  • memory/4328-139-0x0000000009A90000-0x0000000009ACC000-memory.dmp
    Filesize

    240KB

  • memory/4328-140-0x0000000009AD0000-0x0000000009AE2000-memory.dmp
    Filesize

    72KB

  • memory/4328-141-0x0000000008E44000-0x0000000008E46000-memory.dmp
    Filesize

    8KB

  • memory/4328-142-0x0000000009CA0000-0x0000000009DAA000-memory.dmp
    Filesize

    1.0MB