Analysis

  • max time kernel
    91s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2022 14:40

General

  • Target

    da3298795945cabb0ca78054fcf4795e3f50e507c68dc395e2e6c200629f4f1a.exe

  • Size

    106KB

  • MD5

    047ec42c289cabbe554b657134e579da

  • SHA1

    f710229658147cc47655789fc381894c9b0389e7

  • SHA256

    da3298795945cabb0ca78054fcf4795e3f50e507c68dc395e2e6c200629f4f1a

  • SHA512

    7697b837e3dcabd93df54116e1466433719843a2975e05b1b568cd1e3e0359356f3d96cc9b1b58a24d8f0ec2a3654990708492838413024599a437a99309daa7

  • SSDEEP

    3072:/lZp6XfVrURjmT6QBHY+fTyZM4snh7RiMVotxGBrw2:/hcZ6I6QBHu8h7AO

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da3298795945cabb0ca78054fcf4795e3f50e507c68dc395e2e6c200629f4f1a.exe
    "C:\Users\Admin\AppData\Local\Temp\da3298795945cabb0ca78054fcf4795e3f50e507c68dc395e2e6c200629f4f1a.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4772

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads