Analysis

  • max time kernel
    162s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 09:57

General

  • Target

    a64cfdc0896af8b505a745b2d8a28bb19e832a09995411123cf2fc6841c77fb8.exe

  • Size

    372KB

  • MD5

    e44059e1d6531084764190d950cddc5b

  • SHA1

    234b647b094cc3156dfc29065d72b358c2dcb4e8

  • SHA256

    a64cfdc0896af8b505a745b2d8a28bb19e832a09995411123cf2fc6841c77fb8

  • SHA512

    f622ad2c0ab5bb121e87c0b8282f8a6f8252ac781d087a45be752d78a5469c89d949a566114a6f284c164ff352ee487a87bce92948e1afaebfc00a66e39e6e0d

  • SSDEEP

    6144:IiTti+B0bL7tLA5Vp34yYdj4G7v4G7AWFn4G7AWF/:nPB0bdLAVNJgJAOA6

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a64cfdc0896af8b505a745b2d8a28bb19e832a09995411123cf2fc6841c77fb8.exe
    "C:\Users\Admin\AppData\Local\Temp\a64cfdc0896af8b505a745b2d8a28bb19e832a09995411123cf2fc6841c77fb8.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2348

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads