Analysis

  • max time kernel
    138s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 16:37

General

  • Target

    fab61dc1c99da4749ea47eb05771713ff6e6e7b0f9d1f6e02ef99de8875c6e59.exe

  • Size

    529KB

  • MD5

    1700508045940325f4bb4ffbde86a508

  • SHA1

    9e3cc9cfbde37a5ac44bf9986335052c1691e31c

  • SHA256

    fab61dc1c99da4749ea47eb05771713ff6e6e7b0f9d1f6e02ef99de8875c6e59

  • SHA512

    72e6e07abfc2a5ef92fb0f89c9ebc9914b5d33b2145af51ab95c9e2a504aaf850e492c297d94c331ffe877b55b53f58d22671d287386af2f12031803de440020

  • SSDEEP

    6144:mOkOTUaWUJc0WeCjxoWchVYeSJ7aEbjMeoAacrrOru17Fs0cHi5ggXDKXIyC5Ivt:mOrUNbj2VYPSAPmu17Fs0cC5ggu+wZi

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fab61dc1c99da4749ea47eb05771713ff6e6e7b0f9d1f6e02ef99de8875c6e59.exe
    "C:\Users\Admin\AppData\Local\Temp\fab61dc1c99da4749ea47eb05771713ff6e6e7b0f9d1f6e02ef99de8875c6e59.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:916

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/916-132-0x0000000000AD0000-0x0000000000B5A000-memory.dmp

    Filesize

    552KB