Analysis

  • max time kernel
    84s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2023, 22:40

General

  • Target

    e92d0305fcd72ace674dfdb311d87ce04daf3b9bf0db810443afb20ae73b24a5.exe

  • Size

    12KB

  • MD5

    8d62e32003311df2c6fc3a3f099b2f7d

  • SHA1

    c2fd204d1e6f8d49ee098560b6c11bd7abf1b170

  • SHA256

    e92d0305fcd72ace674dfdb311d87ce04daf3b9bf0db810443afb20ae73b24a5

  • SHA512

    e140859ddcfba553d2159eeb95a658e800f12c9e59623a88ce9368fb330b95d41cf3ea550e8c6dc8437e1ba991e44307fea868e5bb499b42946d2989ef54ff58

  • SSDEEP

    96:yA/vMth9sDLibql3A44P9QL4fwmPImg+A03PvXLOzk+gqWYV4J6oP/zNt:yw+wGWt94+iANiCkc4Jhp

Score
10/10

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e92d0305fcd72ace674dfdb311d87ce04daf3b9bf0db810443afb20ae73b24a5.exe
    "C:\Users\Admin\AppData\Local\Temp\e92d0305fcd72ace674dfdb311d87ce04daf3b9bf0db810443afb20ae73b24a5.exe"
    1⤵
    • Modifies Windows Defender Real-time Protection settings
    • Windows security modification
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/536-133-0x0000000000330000-0x000000000033A000-memory.dmp

    Filesize

    40KB