Analysis

  • max time kernel
    309s
  • max time network
    393s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 19:52

General

  • Target

    464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe

  • Size

    495KB

  • MD5

    0625a11eec4cf2ea408af4bb1da1db67

  • SHA1

    5d0d9aea2a4f9093e35dff127401f1d14051b255

  • SHA256

    464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef

  • SHA512

    509feabb0757d3dbbc271914d86390d215ca420eb5bec4c11a8c8f899918ecdaa87c64a14a3e944a2f1818d2e8b0763d80b88a77bdd0ff40a5a68074451fa65f

  • SSDEEP

    12288:VgDZ0hrDBH+xbPRNOFANn2kScwhvmZ2APfE3UOA:Vi0hJHOPvO6pjmhvmZ2A3l

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe
    "C:\Users\Admin\AppData\Local\Temp\464777b68c882db2be320b8f6a8605d01822c5d3afb9fa44e40f5a0264d6e2ef.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1624

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1624-132-0x0000000074E70000-0x0000000075421000-memory.dmp
    Filesize

    5.7MB

  • memory/1624-133-0x0000000074E70000-0x0000000075421000-memory.dmp
    Filesize

    5.7MB