Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-07-2022 17:12

General

  • Target

    4e91dc14d0580ab07a63425e9c868b4f1d0f1a75fc1ec937b7081782443e2085.exe

  • Size

    16KB

  • MD5

    12eccb51e97308e9e6cb0b528872bc39

  • SHA1

    8f9225c42aef64e1dc1ce142d2b099b7f22b7e95

  • SHA256

    4e91dc14d0580ab07a63425e9c868b4f1d0f1a75fc1ec937b7081782443e2085

  • SHA512

    f384e301a820499f51a9e7bfd57d77d91a6550fdfa148c9d6efc33fdd0397f215a613ef599b1783601e195ef15f3bd4ceb409d0e0e49a940de93d9851f2f4154

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e91dc14d0580ab07a63425e9c868b4f1d0f1a75fc1ec937b7081782443e2085.exe
    "C:\Users\Admin\AppData\Local\Temp\4e91dc14d0580ab07a63425e9c868b4f1d0f1a75fc1ec937b7081782443e2085.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3848

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3848-130-0x00007FF900C00000-0x00007FF901636000-memory.dmp
    Filesize

    10.2MB