Analysis
-
max time kernel
151s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 12:41
Static task
static1
Behavioral task
behavioral1
Sample
430917.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
430917.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
430917.exe
-
Size
330KB
-
MD5
e194989989a1a67a7734611823a1524f
-
SHA1
bcffc771e7e2f343a007e9a60da71a1e342d691e
-
SHA256
06ae29042dd19e5cc3e287eafcb47a934aba12b9c3d4224d31f64a700b1b77ca
-
SHA512
76641f8ed4a09ee40f233f8ba537a8841e6b8cd5f0d7b16a8efcc9154dcc868a05fe72a4f219c948f70fc153ead56da52fb13492c5cad1cba59798171a5637d8
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
430917.exepid process 4828 430917.exe 4828 430917.exe 4828 430917.exe 4828 430917.exe 4828 430917.exe 4828 430917.exe 4828 430917.exe 4828 430917.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
430917.exedescription pid process Token: SeDebugPrivilege 4828 430917.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4828-130-0x0000000000710000-0x0000000000768000-memory.dmpFilesize
352KB
-
memory/4828-131-0x00000000055F0000-0x0000000005B94000-memory.dmpFilesize
5.6MB
-
memory/4828-132-0x0000000005120000-0x00000000051B2000-memory.dmpFilesize
584KB
-
memory/4828-133-0x00000000052D0000-0x00000000052DA000-memory.dmpFilesize
40KB
-
memory/4828-134-0x0000000005450000-0x00000000054EC000-memory.dmpFilesize
624KB
-
memory/4828-135-0x0000000005D10000-0x0000000005D76000-memory.dmpFilesize
408KB