Analysis

  • max time kernel
    73s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-01-2023 11:03

General

  • Target

    b49e1add03e821af2827fc95a776f6dfb4d2528b2bb29480153b58d7299b905d.exe

  • Size

    458KB

  • MD5

    69854c553b47f9f698e714d1f0876225

  • SHA1

    b86ce1b7cddbae66e8d44885d7bfd815b02e6e5d

  • SHA256

    b49e1add03e821af2827fc95a776f6dfb4d2528b2bb29480153b58d7299b905d

  • SHA512

    972955c0bce7e36cbc2f3a9ddc7ae556c8ac3ffccbe84e243367a612ae6a81a06fce947611dee69f2a861d3c90d8d763532a4309daf12d3c8860d638252577c9

  • SSDEEP

    6144:d4NaF1HDRTuTq4pKkvIugCd2NMW6CSVaTrXFtIxRued79AoQn++g:d40FJDRTQqCIumNMWEaTro7uCmB++g

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\b49e1add03e821af2827fc95a776f6dfb4d2528b2bb29480153b58d7299b905d.exe
    "C:\Users\Admin\AppData\Local\Temp\b49e1add03e821af2827fc95a776f6dfb4d2528b2bb29480153b58d7299b905d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4608-132-0x00000000007DE000-0x0000000000814000-memory.dmp

    Filesize

    216KB

  • memory/4608-133-0x0000000000710000-0x0000000000769000-memory.dmp

    Filesize

    356KB

  • memory/4608-134-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4608-135-0x0000000004D40000-0x00000000052E4000-memory.dmp

    Filesize

    5.6MB

  • memory/4608-136-0x00000000052F0000-0x0000000005908000-memory.dmp

    Filesize

    6.1MB

  • memory/4608-137-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4608-138-0x0000000005910000-0x0000000005A1A000-memory.dmp

    Filesize

    1.0MB

  • memory/4608-139-0x0000000004CA0000-0x0000000004CDC000-memory.dmp

    Filesize

    240KB

  • memory/4608-140-0x0000000005CA0000-0x0000000005D06000-memory.dmp

    Filesize

    408KB

  • memory/4608-141-0x0000000006380000-0x0000000006412000-memory.dmp

    Filesize

    584KB

  • memory/4608-142-0x0000000006420000-0x0000000006496000-memory.dmp

    Filesize

    472KB

  • memory/4608-143-0x00000000064E0000-0x00000000064FE000-memory.dmp

    Filesize

    120KB

  • memory/4608-144-0x0000000006590000-0x0000000006752000-memory.dmp

    Filesize

    1.8MB

  • memory/4608-145-0x0000000006780000-0x0000000006CAC000-memory.dmp

    Filesize

    5.2MB

  • memory/4608-146-0x00000000007DE000-0x0000000000814000-memory.dmp

    Filesize

    216KB

  • memory/4608-147-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB