Analysis

  • max time kernel
    207s
  • max time network
    232s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/12/2022, 20:08

General

  • Target

    a4244c0cd0d37df29aba1939cd656ae6e65a8cc08d74be5048f68ad53aa9263f.exe

  • Size

    477KB

  • MD5

    f19020d996db43b3a794a7c909559018

  • SHA1

    4cc40dacf4105d53e69e50900289bcf8ad0c29fd

  • SHA256

    a4244c0cd0d37df29aba1939cd656ae6e65a8cc08d74be5048f68ad53aa9263f

  • SHA512

    f97161c1823c43467655d7ad4f160ee7b09e650b321e43541a491e5ab5f070818f30fa7edcbd85203a6808cfe33e3edd3b135c61d4179a9da27884387a15c407

  • SSDEEP

    3072:dejlLAUr08Vi7SmKWoWG7RRETY9MVrrBVJQ9d17SAORUDzavZ:LQ7E93u9GTM

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4244c0cd0d37df29aba1939cd656ae6e65a8cc08d74be5048f68ad53aa9263f.exe
    "C:\Users\Admin\AppData\Local\Temp\a4244c0cd0d37df29aba1939cd656ae6e65a8cc08d74be5048f68ad53aa9263f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    PID:672

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/672-132-0x0000000074BF0000-0x00000000751A1000-memory.dmp

          Filesize

          5.7MB

        • memory/672-133-0x0000000074BF0000-0x00000000751A1000-memory.dmp

          Filesize

          5.7MB