Analysis

  • max time kernel
    164s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:08

General

  • Target

    59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exe

  • Size

    2.9MB

  • MD5

    529a2fb135ddc73da1f302131397e419

  • SHA1

    0c85734cac434841de75254f6b9315401be90527

  • SHA256

    59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a

  • SHA512

    717e817ac48e14b9943c4d7a2d164ceec61ef9e4ca8afc7631133cf0ea618476605e5cf4dfec0f07590fe85357f895846c01830aa54d27e035f0f063aa5f27a8

  • SSDEEP

    49152:pJ63sOGPjQWWyG8mS6JhhnQVOM0f6ysS7R78UAZfL2OUhkU5vhFo3f8x:ps3PGYCOM0f66RAUVkAw8x

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exe
    "C:\Users\Admin\AppData\Local\Temp\59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1720

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\evbE6CB.tmp

    Filesize

    1KB

    MD5

    6b56700b891dfef4201931376d7bef88

    SHA1

    b5db200e46f23f98e3179f0d34d31324a344bd7e

    SHA256

    e1f652adbc46cfeed7eec1ef0cc88452d755e9fe79466a1b6de8de97b1e51d81

    SHA512

    4cc1b67422507ecb77f03ea35f809b90cabdc4172343acbf76ff2b1ad37d84b51d3f20587fc410be112355b2afd28f262df71ac7e0a6519a56f1ec0c80ad8078

  • memory/1720-132-0x0000000000400000-0x0000000000402000-memory.dmp

    Filesize

    8KB

  • memory/1720-133-0x0000000000400000-0x000000000053C000-memory.dmp

    Filesize

    1.2MB

  • memory/1720-134-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/1720-136-0x0000000010000000-0x00000000100A5000-memory.dmp

    Filesize

    660KB

  • memory/1720-140-0x0000000010000000-0x00000000100A5000-memory.dmp

    Filesize

    660KB

  • memory/1720-141-0x0000000000400000-0x0000000000580000-memory.dmp

    Filesize

    1.5MB

  • memory/1720-142-0x0000000010000000-0x00000000100A5000-memory.dmp

    Filesize

    660KB

  • memory/1720-143-0x0000000010000000-0x00000000100A5000-memory.dmp

    Filesize

    660KB