Analysis

  • max time kernel
    127s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2022 11:38

General

  • Target

    905fb292dc983a9d731f4716aa2e1ee289975330d11e82df95491f5a9dd7e3ed.exe

  • Size

    9.7MB

  • MD5

    c0051be12503e5a248ef67814dff0b54

  • SHA1

    ba37b4f1c9f98437a7ac9a20a59f4bd1208d17ce

  • SHA256

    905fb292dc983a9d731f4716aa2e1ee289975330d11e82df95491f5a9dd7e3ed

  • SHA512

    d7a97711daf44912777a55177072dc62a69fe40474cfcaab2b5c352ca0e3054c4226ad85879225ab9c02513cef42d415e3f1e62ed74753f2b2586ddf983dadc2

  • SSDEEP

    768:f1e9aXvDotTDZKxtoS1pT5X42LEDSFdZ3iUx7eQIzaRh53a3ySPpT/:f1wa7otTYoJ2wS13Bx7fIz6v3Wp

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905fb292dc983a9d731f4716aa2e1ee289975330d11e82df95491f5a9dd7e3ed.exe
    "C:\Users\Admin\AppData\Local\Temp\905fb292dc983a9d731f4716aa2e1ee289975330d11e82df95491f5a9dd7e3ed.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3928-132-0x000001AC7EE70000-0x000001AC7F822000-memory.dmp

    Filesize

    9.7MB

  • memory/3928-133-0x00007FFBDBAF0000-0x00007FFBDC5B1000-memory.dmp

    Filesize

    10.8MB

  • memory/3928-134-0x00007FFBDBAF0000-0x00007FFBDC5B1000-memory.dmp

    Filesize

    10.8MB