Analysis

  • max time kernel
    153s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220722-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2022 13:17

General

  • Target

    fd3faaddd9eb1c640e8bdf5831b63660500b67dfa4082c9a273a6c9530708c67.exe

  • Size

    1.4MB

  • MD5

    0ede11e1af6813a6cc72ebd3550f9067

  • SHA1

    5f79abdafab5f5122e3146120fa328632e205f3b

  • SHA256

    fd3faaddd9eb1c640e8bdf5831b63660500b67dfa4082c9a273a6c9530708c67

  • SHA512

    06277c992722b65a54e7ec1929bc14cf013c9284d563e82cc7948ba56d1ff8f07629c154b8549c7f8d6b093f965391a9fa99f66d1a69c1bbc45cf4c43b8dce07

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd3faaddd9eb1c640e8bdf5831b63660500b67dfa4082c9a273a6c9530708c67.exe
    "C:\Users\Admin\AppData\Local\Temp\fd3faaddd9eb1c640e8bdf5831b63660500b67dfa4082c9a273a6c9530708c67.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:5092

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5092-132-0x000001EADAAA0000-0x000001EADAAD0000-memory.dmp

    Filesize

    192KB

  • memory/5092-133-0x00007FFDCB990000-0x00007FFDCC451000-memory.dmp

    Filesize

    10.8MB

  • memory/5092-134-0x000001EADB100000-0x000001EADB108000-memory.dmp

    Filesize

    32KB

  • memory/5092-135-0x000001EAF9EF0000-0x000001EAF9F28000-memory.dmp

    Filesize

    224KB

  • memory/5092-136-0x000001EAF3640000-0x000001EAF364E000-memory.dmp

    Filesize

    56KB

  • memory/5092-137-0x00007FFDCB990000-0x00007FFDCC451000-memory.dmp

    Filesize

    10.8MB