Analysis

  • max time kernel
    163s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    08-05-2022 16:40

General

  • Target

    06cab04ec2f82be886f16eed5fcdc5af04b8dbf5095f3471c246436487f34392.exe

  • Size

    16KB

  • MD5

    78ed2fd0ed8b9c5bc292366d5685c87f

  • SHA1

    4807d848979e573bd984b1eee463b84c59aa0e46

  • SHA256

    06cab04ec2f82be886f16eed5fcdc5af04b8dbf5095f3471c246436487f34392

  • SHA512

    ee19d51543612ae2cc6f46f435825ce23716f8165d8e10e4d6dab07a9ce5b20c89a041a7df8067208a695818d62ffb5382ea2c45d5b7d9a877343c2a669dd144

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06cab04ec2f82be886f16eed5fcdc5af04b8dbf5095f3471c246436487f34392.exe
    "C:\Users\Admin\AppData\Local\Temp\06cab04ec2f82be886f16eed5fcdc5af04b8dbf5095f3471c246436487f34392.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4132

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4132-130-0x00007FFD43CE0000-0x00007FFD44716000-memory.dmp
    Filesize

    10.2MB