Analysis

  • max time kernel
    74s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2022 01:11

General

  • Target

    b16b8a3ebd3590adcb24a40b16b6d1c84fa94383ea3535f77bf29cd2e9eec2dd.exe

  • Size

    68KB

  • MD5

    30eed5d06592efa2d74cda1f5830c1bf

  • SHA1

    c472e58ad6f9012bb1e1a60e2ce48b94cc0f6b30

  • SHA256

    b16b8a3ebd3590adcb24a40b16b6d1c84fa94383ea3535f77bf29cd2e9eec2dd

  • SHA512

    2dad0d369031d33dd3696fbc498ef0adc64ef85cef51c8fa4e7e35a052c84ba92895c401c311cdc04cc31c17dc87f31f2af3bad1ee9f905fc4065f4f94ec1faf

  • SSDEEP

    768:mzfZA6xhqGi3b3Oimr7zCCX7Z+Xp9w0Qxr07oxtDH247KnUYMFO82X1D0UFR:ufZy7K7/X7ZQwrr0ExNHU7MFqXbR

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b16b8a3ebd3590adcb24a40b16b6d1c84fa94383ea3535f77bf29cd2e9eec2dd.exe
    "C:\Users\Admin\AppData\Local\Temp\b16b8a3ebd3590adcb24a40b16b6d1c84fa94383ea3535f77bf29cd2e9eec2dd.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2440

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2440-132-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2440-133-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB