Analysis

  • max time kernel
    14s
  • max time network
    17s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2022, 14:17

General

  • Target

    98a0c771e3be8da7f8de4e95aa507c0d64de90cdb274b447ace7dbba535aa48f.exe

  • Size

    91KB

  • MD5

    6ee1743ab6a722913cf439b1e638fcad

  • SHA1

    c8b5663e994b154f7c302d24ea16e7601cb17d87

  • SHA256

    98a0c771e3be8da7f8de4e95aa507c0d64de90cdb274b447ace7dbba535aa48f

  • SHA512

    3f29d43aba4b779adf101ea8b6ece330dd4c924a35bf95e3452d67abc20f250ba407658076cc41f11522368cd86841bff51c89f1a741e86c26dca5ad700cb08a

  • SSDEEP

    1536:aGwtRxOBJyypgmDjVwCfIAIYfGJmIMWtEMfgjtEFoi:nwtRonyypexoiNtxYGoi

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98a0c771e3be8da7f8de4e95aa507c0d64de90cdb274b447ace7dbba535aa48f.exe
    "C:\Users\Admin\AppData\Local\Temp\98a0c771e3be8da7f8de4e95aa507c0d64de90cdb274b447ace7dbba535aa48f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    PID:3896

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3896-132-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/3896-133-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB