Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2023 04:07

General

  • Target

    c3c3e7c82512705f0e2d11a09ac9abed7607ce1f2e3c2c896d0b86e9f0dd9ee6.exe

  • Size

    1.7MB

  • MD5

    83df5bf4d78f1979911322c08ab95881

  • SHA1

    67c9dd8fa357b5e81b78871be3a0d894e3bde1e5

  • SHA256

    c3c3e7c82512705f0e2d11a09ac9abed7607ce1f2e3c2c896d0b86e9f0dd9ee6

  • SHA512

    a72864eda3597f43dc61003c4b8c420a92baa4d981175a3e66838ca24e71bc95960bf6a4b3af20745691a3e30abe3697c90838ae87d96ffc750d9914a86b49de

  • SSDEEP

    24576:Tr2BMB027PcmYfOcccMTJ4Gk9v34o7CnG3ICjL5nkTikoUPMMDSVXT5XbyFPPoya:Tr2yqP4o7uG37ehoUkhXT5Xoo1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3c3e7c82512705f0e2d11a09ac9abed7607ce1f2e3c2c896d0b86e9f0dd9ee6.exe
    "C:\Users\Admin\AppData\Local\Temp\c3c3e7c82512705f0e2d11a09ac9abed7607ce1f2e3c2c896d0b86e9f0dd9ee6.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3636

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3636-133-0x00007FF9B7330000-0x00007FF9B7DF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3636-134-0x00000121E2F50000-0x00000121E2F60000-memory.dmp

    Filesize

    64KB

  • memory/3636-135-0x00000121E2F50000-0x00000121E2F60000-memory.dmp

    Filesize

    64KB

  • memory/3636-136-0x00000121E2F50000-0x00000121E2F60000-memory.dmp

    Filesize

    64KB

  • memory/3636-137-0x00000121E2F50000-0x00000121E2F60000-memory.dmp

    Filesize

    64KB

  • memory/3636-138-0x00000121FEA50000-0x00000121FEA58000-memory.dmp

    Filesize

    32KB

  • memory/3636-139-0x00000121FF0D0000-0x00000121FF108000-memory.dmp

    Filesize

    224KB

  • memory/3636-140-0x00000121FEA60000-0x00000121FEA6E000-memory.dmp

    Filesize

    56KB

  • memory/3636-153-0x00007FF9B7330000-0x00007FF9B7DF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3636-154-0x00000121E2F50000-0x00000121E2F60000-memory.dmp

    Filesize

    64KB

  • memory/3636-155-0x00000121E2F50000-0x00000121E2F60000-memory.dmp

    Filesize

    64KB

  • memory/3636-156-0x00000121E2F50000-0x00000121E2F60000-memory.dmp

    Filesize

    64KB