Analysis

  • max time kernel
    148s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-04-2022 02:33

General

  • Target

    a9e9ad5b5c57be2c4c780ded1910df7530bd616d9d4106796aa58de249fda7de.exe

  • Size

    205KB

  • MD5

    8c5ff560571af11687fcb5f48b222c0c

  • SHA1

    0d712d84801fae946f6c5df75dca74e4d06373c5

  • SHA256

    a9e9ad5b5c57be2c4c780ded1910df7530bd616d9d4106796aa58de249fda7de

  • SHA512

    be39bb244eacf9fa2dc1231e3a84901755d70ee4b60e58c2ed6fe08f350c1c5b36d5064abfa919cc9210a1a98d8121b64b735bd7be1c533eccd0cbf782613f72

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9e9ad5b5c57be2c4c780ded1910df7530bd616d9d4106796aa58de249fda7de.exe
    "C:\Users\Admin\AppData\Local\Temp\a9e9ad5b5c57be2c4c780ded1910df7530bd616d9d4106796aa58de249fda7de.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3056-130-0x0000000000FB0000-0x0000000000FE8000-memory.dmp

    Filesize

    224KB

  • memory/3056-131-0x00000000059B0000-0x0000000005A4C000-memory.dmp

    Filesize

    624KB

  • memory/3056-132-0x0000000006000000-0x00000000065A4000-memory.dmp

    Filesize

    5.6MB

  • memory/3056-133-0x0000000005A50000-0x0000000005AB6000-memory.dmp

    Filesize

    408KB