Analysis

  • max time kernel
    91s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/11/2022, 00:52

General

  • Target

    file.exe

  • Size

    429KB

  • MD5

    9bdc4f241dee7639186ccbffb7cf00b5

  • SHA1

    a4c067dc58d8b89fce57ef68ee0b1e9ccf3515d9

  • SHA256

    22776deccfaaf5669bc366b46eb9710aaae7fd4470f2d404ed32e2cbb7369736

  • SHA512

    f88c6542aecfe8e30e0fbfe0f148b0aaa7d0444a6664b33a3813927b32c5abd535525de90f5f08919c7f82112cf58655820c6a4b9eb7e53165f5d5978ed89013

  • SSDEEP

    6144:dkTnN0sKNKKhWblo6e/PLFLs8jl5+E2oEWf+3v/c5fDEhtM6oevA8uZu5N:OnNdeKKhWZo6YLvjl5+E/+M9EhtBo+N

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4364-132-0x0000000000ABB000-0x0000000000AEE000-memory.dmp

    Filesize

    204KB

  • memory/4364-133-0x0000000002480000-0x00000000024EE000-memory.dmp

    Filesize

    440KB

  • memory/4364-134-0x0000000000400000-0x000000000086F000-memory.dmp

    Filesize

    4.4MB

  • memory/4364-135-0x0000000005010000-0x00000000055B4000-memory.dmp

    Filesize

    5.6MB

  • memory/4364-136-0x0000000005610000-0x0000000005C28000-memory.dmp

    Filesize

    6.1MB

  • memory/4364-137-0x0000000005C60000-0x0000000005C72000-memory.dmp

    Filesize

    72KB

  • memory/4364-138-0x0000000005C80000-0x0000000005D8A000-memory.dmp

    Filesize

    1.0MB

  • memory/4364-139-0x0000000005D90000-0x0000000005DCC000-memory.dmp

    Filesize

    240KB

  • memory/4364-140-0x0000000000ABB000-0x0000000000AEE000-memory.dmp

    Filesize

    204KB

  • memory/4364-141-0x0000000002480000-0x00000000024EE000-memory.dmp

    Filesize

    440KB

  • memory/4364-142-0x0000000000400000-0x000000000086F000-memory.dmp

    Filesize

    4.4MB

  • memory/4364-143-0x0000000006470000-0x0000000006502000-memory.dmp

    Filesize

    584KB

  • memory/4364-144-0x0000000006510000-0x0000000006576000-memory.dmp

    Filesize

    408KB

  • memory/4364-145-0x0000000006980000-0x0000000006B42000-memory.dmp

    Filesize

    1.8MB

  • memory/4364-146-0x0000000006B60000-0x000000000708C000-memory.dmp

    Filesize

    5.2MB

  • memory/4364-147-0x00000000071A0000-0x0000000007216000-memory.dmp

    Filesize

    472KB

  • memory/4364-148-0x0000000007260000-0x000000000727E000-memory.dmp

    Filesize

    120KB

  • memory/4364-149-0x0000000000ABB000-0x0000000000AEE000-memory.dmp

    Filesize

    204KB

  • memory/4364-150-0x0000000000400000-0x000000000086F000-memory.dmp

    Filesize

    4.4MB