Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
12-04-2022 12:19
Static task
static1
Behavioral task
behavioral1
Sample
2c99b322294e3bdb7d4847e7a3d3aa4f.exe
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2c99b322294e3bdb7d4847e7a3d3aa4f.exe
Resource
win10v2004-20220331-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
2c99b322294e3bdb7d4847e7a3d3aa4f.exe
-
Size
417KB
-
MD5
2c99b322294e3bdb7d4847e7a3d3aa4f
-
SHA1
935b4415c1428599ebaaa3147263d40da59c3f8c
-
SHA256
f43218dafaae05d7aae7be5decbfba881ed422e4e14273181cd8bd13f0ed4ab3
-
SHA512
5c2396dc1caaa36f9d3ed9a762139178a55bc9192c57304e67232ebb4785d3110a592c08c38d0c2f7363a87868725cb74ee8565cdda8528a7f9c0e45fe727b74
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2c99b322294e3bdb7d4847e7a3d3aa4f.exedescription pid process Token: SeDebugPrivilege 5024 2c99b322294e3bdb7d4847e7a3d3aa4f.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5024-124-0x00000000005C0000-0x00000000005EB000-memory.dmpFilesize
172KB
-
memory/5024-125-0x0000000000620000-0x0000000000659000-memory.dmpFilesize
228KB
-
memory/5024-126-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/5024-127-0x0000000004B30000-0x00000000050D4000-memory.dmpFilesize
5.6MB
-
memory/5024-128-0x00000000051D0000-0x00000000057E8000-memory.dmpFilesize
6.1MB
-
memory/5024-129-0x0000000005840000-0x0000000005852000-memory.dmpFilesize
72KB
-
memory/5024-130-0x0000000005860000-0x000000000596A000-memory.dmpFilesize
1.0MB
-
memory/5024-131-0x0000000005990000-0x00000000059CC000-memory.dmpFilesize
240KB
-
memory/5024-132-0x0000000002304000-0x0000000002306000-memory.dmpFilesize
8KB