Analysis

  • max time kernel
    151s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 12:14

General

  • Target

    ORDER_DA.scr

  • Size

    579KB

  • MD5

    f6aba9195644c0b69efff06ecf23e6c4

  • SHA1

    fb76eb813b4e072d68ffe2916a578d14cf845824

  • SHA256

    03fc6fb46457641645117a9c29292069714568ff711647455c70769d7ab3485a

  • SHA512

    3f4d8bfd0dd0104b3d48df9201b1a7628a326b43a8467b3830f002a799d7ada0288d46281c57126d5ddee93a0adb16e3577797ba80104333e55af3e66a1cf7c7

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ORDER_DA.scr
    "C:\Users\Admin\AppData\Local\Temp\ORDER_DA.scr" /S
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:908

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/908-130-0x0000000000C30000-0x0000000000CC8000-memory.dmp
    Filesize

    608KB

  • memory/908-131-0x0000000005F30000-0x00000000064D4000-memory.dmp
    Filesize

    5.6MB

  • memory/908-132-0x0000000005B20000-0x0000000005BB2000-memory.dmp
    Filesize

    584KB

  • memory/908-133-0x00000000064F0000-0x00000000064FA000-memory.dmp
    Filesize

    40KB

  • memory/908-134-0x0000000001380000-0x000000000141C000-memory.dmp
    Filesize

    624KB

  • memory/908-135-0x0000000007840000-0x00000000078A6000-memory.dmp
    Filesize

    408KB