Analysis

  • max time kernel
    102s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2023, 08:09

General

  • Target

    Token.exe

  • Size

    32KB

  • MD5

    6a7a6f9cdf3821e4b12a721b766b4f46

  • SHA1

    d0c8f8869b3a67d21abced6399d3693d974561ee

  • SHA256

    e37a527a47b6dfb4f839195f826e92e83cea80ac67209efaecabf19497c7e295

  • SHA512

    f5e3e947649446aae47e8d541af18cba9aa5af30c5e4e31f71184ec43e5f986967b44b44b862b61deae37dee9cc2a127e717bac95aa6caee7a63c81a4640b0ad

  • SSDEEP

    768:pfZVwtakJHbAlvKLZ7jms633TM+wnhSmO13K+A4mRei5h:NZetuc9is6oFOO4mRei5h

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Token.exe
    "C:\Users\Admin\AppData\Local\Temp\Token.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2400

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads