Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 00:59

General

  • Target

    Remitttance jpg.scr

  • Size

    324KB

  • MD5

    dce5536f0ec74014e25f5253447d4e98

  • SHA1

    29209f0f85dcdd71ef3453caf3b208c1a2120776

  • SHA256

    d93fb27172d9296a4067808a2dcc325bbed786666cc49646dfd0684ad9a92beb

  • SHA512

    1acf8e60b674ed698dba884658ed82be16156f85b39fe1b1c18598e64b527ccfd3b529b2b22185d85d50e5efab380c08749e189b4a83476c7ea8e69a62b515a5

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Remitttance jpg.scr
    "C:\Users\Admin\AppData\Local\Temp\Remitttance jpg.scr" /S
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2692

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2692-130-0x0000000000600000-0x0000000000658000-memory.dmp

    Filesize

    352KB

  • memory/2692-131-0x00000000055C0000-0x0000000005B64000-memory.dmp

    Filesize

    5.6MB

  • memory/2692-132-0x0000000005010000-0x00000000050A2000-memory.dmp

    Filesize

    584KB

  • memory/2692-133-0x00000000051B0000-0x00000000051BA000-memory.dmp

    Filesize

    40KB

  • memory/2692-134-0x0000000007580000-0x000000000761C000-memory.dmp

    Filesize

    624KB

  • memory/2692-135-0x0000000007990000-0x00000000079F6000-memory.dmp

    Filesize

    408KB