Resubmissions

19-02-2023 12:07

230219-pafjmaeh7w 7

Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    19-02-2023 12:07

General

  • Target

    Striker.exe

  • Size

    3.5MB

  • MD5

    3506e72217d5206c43afa993546008aa

  • SHA1

    caaa849768a6db9a08c1ca3dba8f31ab8669d04f

  • SHA256

    0fb8caced876c692d3ed1cfe956b07b1acb9128ff36f07783500deadfad4a8fd

  • SHA512

    c077270ef57c52c8c42d51afedba9e1229e40f1b198a2181d1fcfb7bb20fed29af9bdcc4150c4f721f61a40baa965b6b8a8cb90257e7cf2d954e62fc759ce68e

  • SSDEEP

    98304:5shZSJb/1czHpcaBoIJAQtKixNWoiJk5VLjkwOh:5G4bi/B3JBLCoiCL4

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Striker.exe
    "C:\Users\Admin\AppData\Local\Temp\Striker.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4976

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4976-132-0x0000022F7A130000-0x0000022F7A4BC000-memory.dmp
    Filesize

    3.5MB

  • memory/4976-133-0x00007FFA05DD0000-0x00007FFA06891000-memory.dmp
    Filesize

    10.8MB

  • memory/4976-144-0x0000022F7DB90000-0x0000022F7DC92000-memory.dmp
    Filesize

    1.0MB

  • memory/4976-145-0x00007FFA05DD0000-0x00007FFA06891000-memory.dmp
    Filesize

    10.8MB