Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 01:21

General

  • Target

    Deposit Scan8375647765.exe

  • Size

    405KB

  • MD5

    79aaf1a43c69a0276d646a4d3048c3be

  • SHA1

    58ea495df57f673b02f5874fb63660f3df6a3c6b

  • SHA256

    b274d35702981583cc16bca01745c74446bae278d8b41cdd1c4276690fef088a

  • SHA512

    422c95514022394d17e3f07d112f821713b4b983bf5a79b598944ff0a2302849468ea2091138bbf606d3075b41df6aec1b3d5e285c448c30e26a7973df8e781e

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Deposit Scan8375647765.exe
    "C:\Users\Admin\AppData\Local\Temp\Deposit Scan8375647765.exe"
    1⤵
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3928-130-0x00000000001A0000-0x000000000020C000-memory.dmp
    Filesize

    432KB

  • memory/3928-131-0x0000000004B80000-0x0000000004C12000-memory.dmp
    Filesize

    584KB

  • memory/3928-132-0x00000000051D0000-0x0000000005774000-memory.dmp
    Filesize

    5.6MB

  • memory/3928-133-0x0000000004FA0000-0x000000000503C000-memory.dmp
    Filesize

    624KB

  • memory/3928-134-0x0000000005140000-0x00000000051A6000-memory.dmp
    Filesize

    408KB