Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 14:08

General

  • Target

    b0c0b0dbd3d89eddc33e1c4575c11039be8622f424ee021d1f9fb9e538f0ba97.exe

  • Size

    16KB

  • MD5

    bf922b93fe4e1891e025093f259de292

  • SHA1

    5582a06612c9d4400b74b9e335d84ea92f78902e

  • SHA256

    b0c0b0dbd3d89eddc33e1c4575c11039be8622f424ee021d1f9fb9e538f0ba97

  • SHA512

    5ac8ff18f172be53823bfb6224934102cefc1c892c533a8075cbf95c959bc15b4ae35c198fd1bf2fffe314c8e8855fd4731d8b600fa2ddc45bea68513c7c6ddb

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0c0b0dbd3d89eddc33e1c4575c11039be8622f424ee021d1f9fb9e538f0ba97.exe
    "C:\Users\Admin\AppData\Local\Temp\b0c0b0dbd3d89eddc33e1c4575c11039be8622f424ee021d1f9fb9e538f0ba97.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4384

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4384-130-0x00007FFEAB4D0000-0x00007FFEABF06000-memory.dmp
    Filesize

    10.2MB