Analysis

  • max time kernel
    189s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 16:35

General

  • Target

    SecuriteInfo.com.Variant.Strictor.276038.6712.23165.exe

  • Size

    48KB

  • MD5

    1476bec554a2de94d19c44ce3ed8fff5

  • SHA1

    ce5741dda34d3133707a85ade30aaf1bfd133dad

  • SHA256

    3a940b88c6cc22f5051a10c4b437cfb72aa9aad9e0bcb15c18a83116e80739d4

  • SHA512

    fe696c0fa17b9fcc7cdc2aba05516b8a93955366fa151ac4b5c06c2d3bdcc7b2cdfd6528c63cc8b7f139c64561cbecc1f381ef14c97872c701c633ebb5878f76

  • SSDEEP

    384:oTJU0v4hw2lG8tUHHojSeOiV9qXBKmFptYcFmVc03K:oTYdlGFHHfXtYcFmVc6K

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Strictor.276038.6712.23165.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Strictor.276038.6712.23165.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4820

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4820-132-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/4820-133-0x0000000006500000-0x0000000006AA4000-memory.dmp
    Filesize

    5.6MB

  • memory/4820-134-0x0000000005F50000-0x0000000005FE2000-memory.dmp
    Filesize

    584KB

  • memory/4820-135-0x00000000013C0000-0x00000000013E2000-memory.dmp
    Filesize

    136KB