Analysis

  • max time kernel
    144s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/11/2022, 23:13

General

  • Target

    1e60b2f011e316d1cded14fb33d0717d65509d0bc9b7cceb8bd6ce3934127daf.exe

  • Size

    654KB

  • MD5

    6d66c3e68ddaf52ea59196254f2cbb1a

  • SHA1

    c4d3f4a2e50b6b067fe863252958a3b3e4e7bace

  • SHA256

    1e60b2f011e316d1cded14fb33d0717d65509d0bc9b7cceb8bd6ce3934127daf

  • SHA512

    1ad6fb749cfbcc1a69e16d6144639c2d09dc1c87aff347d3ed1c2fb6331d052d83cebb006a3cda53ce9acad12fd5318752f47351c3d6a09b56a423c2f022c7f0

  • SSDEEP

    12288:tLscYJRxxc5YOwRBNnclcQ0NozXpCorjR:3WR5jQcQ0NozXpBB

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e60b2f011e316d1cded14fb33d0717d65509d0bc9b7cceb8bd6ce3934127daf.exe
    "C:\Users\Admin\AppData\Local\Temp\1e60b2f011e316d1cded14fb33d0717d65509d0bc9b7cceb8bd6ce3934127daf.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4824

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4824-132-0x0000000000350000-0x00000000003F8000-memory.dmp

          Filesize

          672KB