Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-05-2023 01:37

General

  • Target

    bcacc9b5f549ea9f84b329bb2fdf9293.exe

  • Size

    1.6MB

  • MD5

    bcacc9b5f549ea9f84b329bb2fdf9293

  • SHA1

    e5e6b61d29a99deb53d69ef72e1153bbf0beeb55

  • SHA256

    eabc658deece003f4e76ef76fd0932a0a2d91e63725bb11daf07dc7052689b76

  • SHA512

    86a385a22595129c3059c834a175c303b722f197a59a12bb96a96d01998ca0e8eff5a27552f4921745b7e015b98b4ad46b277099927af89249ce79b22b706483

  • SSDEEP

    24576:2inUIrP+Zeb+NKgNqRB+uCny6Dorar3QrLamx4wlKDSVXT5Xzwya:2iZGXN3IB+Tny6cGlwlfXT5Xzw1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcacc9b5f549ea9f84b329bb2fdf9293.exe
    "C:\Users\Admin\AppData\Local\Temp\bcacc9b5f549ea9f84b329bb2fdf9293.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4556-135-0x000002DE2E480000-0x000002DE2E4B4000-memory.dmp

    Filesize

    208KB

  • memory/4556-138-0x000002DE2E3F0000-0x000002DE2E400000-memory.dmp

    Filesize

    64KB

  • memory/4556-141-0x000002DE2E3F0000-0x000002DE2E400000-memory.dmp

    Filesize

    64KB

  • memory/4556-140-0x000002DE2E3F0000-0x000002DE2E400000-memory.dmp

    Filesize

    64KB

  • memory/4556-139-0x000002DE2E3F0000-0x000002DE2E400000-memory.dmp

    Filesize

    64KB

  • memory/4556-142-0x000002DE4BE50000-0x000002DE4BE58000-memory.dmp

    Filesize

    32KB

  • memory/4556-143-0x000002DE2E3F0000-0x000002DE2E400000-memory.dmp

    Filesize

    64KB

  • memory/4556-144-0x000002DE4BED0000-0x000002DE4BF08000-memory.dmp

    Filesize

    224KB

  • memory/4556-145-0x000002DE4BEA0000-0x000002DE4BEAE000-memory.dmp

    Filesize

    56KB

  • memory/4556-158-0x000002DE2E3F0000-0x000002DE2E400000-memory.dmp

    Filesize

    64KB

  • memory/4556-159-0x000002DE2E3F0000-0x000002DE2E400000-memory.dmp

    Filesize

    64KB

  • memory/4556-160-0x000002DE2E3F0000-0x000002DE2E400000-memory.dmp

    Filesize

    64KB

  • memory/4556-161-0x000002DE2E3F0000-0x000002DE2E400000-memory.dmp

    Filesize

    64KB

  • memory/4556-162-0x000002DE2E3F0000-0x000002DE2E400000-memory.dmp

    Filesize

    64KB