Analysis

  • max time kernel
    291s
  • max time network
    302s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 07:14

General

  • Target

    4bed1b3dd73c3e7a34b394c12fe0eacc92e1a77b1f758419a9087fde7512dd17.exe

  • Size

    1.0MB

  • MD5

    6128b453f7d80237c07a07fc76a37f67

  • SHA1

    f0d30ec91253ba409417f8266fd531b10aa4f261

  • SHA256

    4bed1b3dd73c3e7a34b394c12fe0eacc92e1a77b1f758419a9087fde7512dd17

  • SHA512

    62db0a292ce817f32029b3bab241424d895ab931ec347aa660a6751b51ac52bce51fbb6c3671fc5eaf425c8314da5d6be618f939818af675625a957d70089cc4

  • SSDEEP

    12288:1Go3uZnCIh2zhgDiGtAvKIawdYHHS/swEsqcBynhkzLEkROAgbRMN:9eZnPMgDiGR/wOyQs0nhSLEcOAgCN

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4bed1b3dd73c3e7a34b394c12fe0eacc92e1a77b1f758419a9087fde7512dd17.exe
    "C:\Users\Admin\AppData\Local\Temp\4bed1b3dd73c3e7a34b394c12fe0eacc92e1a77b1f758419a9087fde7512dd17.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3396

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads