Analysis

  • max time kernel
    160s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 09:36

General

  • Target

    SecuriteInfo.com.Win32.DropperX-gen.6177.22589.exe

  • Size

    226KB

  • MD5

    50add4363a4cacf4c0543fd2a9c5cbc6

  • SHA1

    08ac5155c663a98c1697b997e2e216955973c6f2

  • SHA256

    dbf3e0130e9d10d5b08b635c67f775b71d10ef5b5f3977b4f15675fbdba9faa0

  • SHA512

    f99e7a6dd95ae303c27f1e2efe05e8eae1b13abe67f41077c84f6af8f5fa21ca54f16e6df51fb54d4efce7d93b2eb00cf73939a99af9349e00713d964a773180

  • SSDEEP

    384:4k1/Ln1fA4LHkgdbCo4BmK3p9ncVVsOyH6/MptYcFmVc03K:4kZpGfBmupQVBZwtYcFmVc6K

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.6177.22589.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.DropperX-gen.6177.22589.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1400

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1400-132-0x0000000000F70000-0x0000000000FAE000-memory.dmp
    Filesize

    248KB

  • memory/1400-133-0x0000000006AD0000-0x0000000007074000-memory.dmp
    Filesize

    5.6MB

  • memory/1400-134-0x0000000006620000-0x00000000066B2000-memory.dmp
    Filesize

    584KB

  • memory/1400-135-0x00000000065D0000-0x00000000065F2000-memory.dmp
    Filesize

    136KB