Analysis

  • max time kernel
    128s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/07/2023, 05:30

General

  • Target

    ss.exe

  • Size

    22KB

  • MD5

    c524890f4f9345b9d8b6e8fd7b177ac0

  • SHA1

    ccd3ff939f2d64b047902abeca331a62d322f05c

  • SHA256

    d000306b84bccf5c87592127ad8f9f8ee88bf6b57153f4fc45117f639f67503b

  • SHA512

    aa0f5f2970d358a13114022e8d34a79c8054e94bf7220d81337edf15c1173fcb70a455a762fc23fc53ad10d09e0118cc3189629e74f6d1a1b0efa678d2085615

  • SSDEEP

    384:87pVfvgBydG4okAG4Bnje3bbw95RO9eJR3Qd5xSDOg:8FVfRokyCbcmnC3

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ss.exe
    "C:\Users\Admin\AppData\Local\Temp\ss.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4340

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4340-117-0x0000000000500000-0x000000000050C000-memory.dmp

    Filesize

    48KB

  • memory/4340-118-0x0000000002920000-0x0000000002930000-memory.dmp

    Filesize

    64KB