Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    14-07-2022 06:02

General

  • Target

    c4a24a93cb689eb5ce8ca476118f6983.exe

  • Size

    378KB

  • MD5

    c4a24a93cb689eb5ce8ca476118f6983

  • SHA1

    833512deb8c105939a4f9c18d8b9b92e7fa64542

  • SHA256

    bcee5962ccbae61d63a80108d4579836fe7df25333af91527e1511e82fa5bfd4

  • SHA512

    4bb02b74ec182b9d5d549e412d2ed46509c372c5ade2b905a17fadbf43ce722c7652dc923e35976803eeefb21985fd322927a9ce2b5eb0e0ed9b3395b37702f6

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4a24a93cb689eb5ce8ca476118f6983.exe
    "C:\Users\Admin\AppData\Local\Temp\c4a24a93cb689eb5ce8ca476118f6983.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/868-130-0x00000000008DD000-0x0000000000907000-memory.dmp
    Filesize

    168KB

  • memory/868-131-0x0000000002270000-0x00000000022A7000-memory.dmp
    Filesize

    220KB

  • memory/868-132-0x0000000000400000-0x000000000067B000-memory.dmp
    Filesize

    2.5MB

  • memory/868-133-0x0000000004DE0000-0x0000000005384000-memory.dmp
    Filesize

    5.6MB

  • memory/868-134-0x00000000008DD000-0x0000000000907000-memory.dmp
    Filesize

    168KB

  • memory/868-135-0x0000000005390000-0x00000000059A8000-memory.dmp
    Filesize

    6.1MB

  • memory/868-136-0x0000000005A10000-0x0000000005A22000-memory.dmp
    Filesize

    72KB

  • memory/868-137-0x0000000005A30000-0x0000000005B3A000-memory.dmp
    Filesize

    1.0MB

  • memory/868-138-0x0000000005B60000-0x0000000005B9C000-memory.dmp
    Filesize

    240KB