Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2022, 12:52

General

  • Target

    8fdca65e5185255fd19334cc185f14be746be60eda990afb55a1d97beccc1b2f.exe

  • Size

    237KB

  • MD5

    65c5522e8deed6aacddc68b10d80cca0

  • SHA1

    9c4437db9d96158a64f52f432236725bdc15f31d

  • SHA256

    8fdca65e5185255fd19334cc185f14be746be60eda990afb55a1d97beccc1b2f

  • SHA512

    3c1d78428c0ea865d9b5964a001927023b4ce0cfb49aeca1eabf3b7637fa5dcfd68464fbb425a4744856027d18961785834122f5da2d0783ea714fbf4983b3e9

  • SSDEEP

    6144:dm47kuVrY0mVbeBybTPImENUvGKVMQRoS0QZ3:5tM08b1HImbGKy/StV

Score
6/10

Malware Config

Signatures

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fdca65e5185255fd19334cc185f14be746be60eda990afb55a1d97beccc1b2f.exe
    "C:\Users\Admin\AppData\Local\Temp\8fdca65e5185255fd19334cc185f14be746be60eda990afb55a1d97beccc1b2f.exe"
    1⤵
    • Modifies WinLogon
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:5068

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/5068-132-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/5068-133-0x0000000002240000-0x0000000002298000-memory.dmp

          Filesize

          352KB

        • memory/5068-134-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/5068-135-0x0000000002370000-0x0000000002424000-memory.dmp

          Filesize

          720KB

        • memory/5068-136-0x0000000002890000-0x0000000002953000-memory.dmp

          Filesize

          780KB

        • memory/5068-137-0x0000000002240000-0x0000000002298000-memory.dmp

          Filesize

          352KB

        • memory/5068-138-0x0000000000400000-0x00000000004AD000-memory.dmp

          Filesize

          692KB

        • memory/5068-139-0x0000000002890000-0x0000000002953000-memory.dmp

          Filesize

          780KB