Analysis

  • max time kernel
    49s
  • max time network
    51s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/05/2023, 21:15

General

  • Target

    ea0761c14aa2ccd3105bcc35199b49fa0afcf807ed2ba83edf44a02aa0c230ab.exe

  • Size

    410KB

  • MD5

    2e6b57a118783655eff25f88575b4401

  • SHA1

    24534c3fb395e61a605e87425c265e55d80bfc91

  • SHA256

    ea0761c14aa2ccd3105bcc35199b49fa0afcf807ed2ba83edf44a02aa0c230ab

  • SHA512

    cfa3c9cdb51558b84ec0b07b3a4346b5951985886c8f93337fbf472dd820e0feb956c79f3df66828c716ab802113f00908d89769f7246f478ca6980f6fa5275f

  • SSDEEP

    6144:zkHyCZeR6P60HVTW6nEgYBgmByiSXCGsJ6E0Ht9r/:YHvZeR6S2VzegmBACGS0NZ/

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea0761c14aa2ccd3105bcc35199b49fa0afcf807ed2ba83edf44a02aa0c230ab.exe
    "C:\Users\Admin\AppData\Local\Temp\ea0761c14aa2ccd3105bcc35199b49fa0afcf807ed2ba83edf44a02aa0c230ab.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2044

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2044-122-0x00000000008A0000-0x00000000008DE000-memory.dmp

          Filesize

          248KB

        • memory/2044-123-0x0000000002820000-0x000000000284E000-memory.dmp

          Filesize

          184KB

        • memory/2044-124-0x0000000004FF0000-0x00000000054EE000-memory.dmp

          Filesize

          5.0MB

        • memory/2044-125-0x0000000002870000-0x000000000289C000-memory.dmp

          Filesize

          176KB

        • memory/2044-126-0x0000000007E80000-0x0000000008486000-memory.dmp

          Filesize

          6.0MB

        • memory/2044-127-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

          Filesize

          64KB

        • memory/2044-128-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

          Filesize

          64KB

        • memory/2044-129-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

          Filesize

          64KB

        • memory/2044-130-0x0000000004F90000-0x0000000004FA2000-memory.dmp

          Filesize

          72KB

        • memory/2044-131-0x0000000007870000-0x000000000797A000-memory.dmp

          Filesize

          1.0MB

        • memory/2044-132-0x0000000007980000-0x00000000079BE000-memory.dmp

          Filesize

          248KB

        • memory/2044-133-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

          Filesize

          64KB

        • memory/2044-134-0x00000000079E0000-0x0000000007A2B000-memory.dmp

          Filesize

          300KB

        • memory/2044-135-0x0000000007C80000-0x0000000007CE6000-memory.dmp

          Filesize

          408KB

        • memory/2044-136-0x0000000008940000-0x00000000089D2000-memory.dmp

          Filesize

          584KB

        • memory/2044-137-0x00000000089E0000-0x0000000008A56000-memory.dmp

          Filesize

          472KB

        • memory/2044-138-0x0000000008A90000-0x0000000008AAE000-memory.dmp

          Filesize

          120KB

        • memory/2044-139-0x0000000000400000-0x0000000000701000-memory.dmp

          Filesize

          3.0MB

        • memory/2044-140-0x0000000008BB0000-0x0000000008D72000-memory.dmp

          Filesize

          1.8MB

        • memory/2044-141-0x0000000008D80000-0x00000000092AC000-memory.dmp

          Filesize

          5.2MB

        • memory/2044-142-0x00000000008A0000-0x00000000008DE000-memory.dmp

          Filesize

          248KB

        • memory/2044-144-0x0000000000400000-0x0000000000701000-memory.dmp

          Filesize

          3.0MB