Analysis

  • max time kernel
    70s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-06-2022 09:12

General

  • Target

    4d96ddab9510a95c16d2c8675e5c2ba3.exe

  • Size

    511KB

  • MD5

    4d96ddab9510a95c16d2c8675e5c2ba3

  • SHA1

    3f006d01c1deffe37f54b438da3449b004a585dd

  • SHA256

    6c6d04b9d2191a82613f7572d0211075066ba679e1e53c2d1ca190de8bcc7eb5

  • SHA512

    0938e3da12d33645e66a3ccaad487c61412df8308c7085e108640ed48e187d7f0ef9a311ce230bd509917c73b3f54b577b8ea212dab73c288c9c148fdd826dfd

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d96ddab9510a95c16d2c8675e5c2ba3.exe
    "C:\Users\Admin\AppData\Local\Temp\4d96ddab9510a95c16d2c8675e5c2ba3.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3204

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3204-130-0x0000000000BF0000-0x0000000000C76000-memory.dmp

    Filesize

    536KB

  • memory/3204-131-0x0000000005C30000-0x00000000061D4000-memory.dmp

    Filesize

    5.6MB

  • memory/3204-132-0x0000000005680000-0x0000000005712000-memory.dmp

    Filesize

    584KB

  • memory/3204-133-0x0000000005620000-0x000000000562A000-memory.dmp

    Filesize

    40KB