Analysis

  • max time kernel
    218s
  • max time network
    236s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 17:02

General

  • Target

    b6ae86cdeed1873ccd55b897c0d249938db9b3d825e5d82807107069309e0e10.exe

  • Size

    291KB

  • MD5

    f1d08784a891bc34a4fc6090598ff164

  • SHA1

    6a494966cd02958f1945df25642e088657bf1e2c

  • SHA256

    b6ae86cdeed1873ccd55b897c0d249938db9b3d825e5d82807107069309e0e10

  • SHA512

    3edacd7e6bb35805b7bfec2e1534d91f1b88a11d615a69c1a3c9b017d653c2ce5c38235fd9186a393a628bf757559b74fe0bd2e54fb86df31740f594a4b218a7

  • SSDEEP

    6144:ctsEGCG8epaI1IShkPVHXJzytBXGwy715txLtl3xX5SSwEmsYOT89XjuIcV8v:ct31JepcShkP5XJq1yBpX+zsTsTuIn

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6ae86cdeed1873ccd55b897c0d249938db9b3d825e5d82807107069309e0e10.exe
    "C:\Users\Admin\AppData\Local\Temp\b6ae86cdeed1873ccd55b897c0d249938db9b3d825e5d82807107069309e0e10.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1740-132-0x00000000751B0000-0x0000000075761000-memory.dmp

    Filesize

    5.7MB

  • memory/1740-133-0x00000000751B0000-0x0000000075761000-memory.dmp

    Filesize

    5.7MB