Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-03-2023 09:17

General

  • Target

    cc03a8f9433b57e4ea8a87544dde5470.exe

  • Size

    35KB

  • MD5

    cc03a8f9433b57e4ea8a87544dde5470

  • SHA1

    d44e2e33aa3f7780db64ece0483958b87b063a75

  • SHA256

    8688a4bb898f17009992f83072b5c5a3a60e9e552a95002470e1c2f885563fbd

  • SHA512

    50ac102923a0eb17f27c24ca1528fd03258eef549448bfe6e4b7d91c57a2e0a2b4c8eb2a7018afca875f547b9d12c2d5e046755edef55301be9dcd6632d5fdce

  • SSDEEP

    768:tTRSgQ0ZZeIYVudX6nHs+Y5nXq0AZ7yx6tWLrx7GR4:t1peKT5Xq0s6GWLr9q4

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc03a8f9433b57e4ea8a87544dde5470.exe
    "C:\Users\Admin\AppData\Local\Temp\cc03a8f9433b57e4ea8a87544dde5470.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1312

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1312-133-0x00000000001D0000-0x00000000001E0000-memory.dmp
    Filesize

    64KB

  • memory/1312-134-0x0000000000A40000-0x0000000000A50000-memory.dmp
    Filesize

    64KB

  • memory/1312-135-0x0000000000A40000-0x0000000000A50000-memory.dmp
    Filesize

    64KB

  • memory/1312-136-0x0000000000A70000-0x0000000000A8A000-memory.dmp
    Filesize

    104KB

  • memory/1312-137-0x0000000000A40000-0x0000000000A50000-memory.dmp
    Filesize

    64KB

  • memory/1312-138-0x0000000000A40000-0x0000000000A50000-memory.dmp
    Filesize

    64KB

  • memory/1312-139-0x0000000000A40000-0x0000000000A50000-memory.dmp
    Filesize

    64KB

  • memory/1312-140-0x0000000000A40000-0x0000000000A50000-memory.dmp
    Filesize

    64KB