Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2023 19:09

General

  • Target

    53be0b2d40689fedf42a5580d0d3b67bec0d74a45230944ccf14ee04feabae14.exe

  • Size

    1.7MB

  • MD5

    6efcc9009c89ce28d8fc937451d41286

  • SHA1

    4f0e940a9839f43c0e4cc8a01d9639c449837a98

  • SHA256

    53be0b2d40689fedf42a5580d0d3b67bec0d74a45230944ccf14ee04feabae14

  • SHA512

    eb22eaa8630c7cd11c926e2e8318e7ec05267189ed1d404c78d94881aea7d8d5beff492000e94b434e943d0098039d0773c020fc1ad6b5f82e4d6609dec12553

  • SSDEEP

    49152:80kz5h5xTFcPzrfmYsatsbUd/XT5XXjtI41:80kDiPH3DvD5nl1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53be0b2d40689fedf42a5580d0d3b67bec0d74a45230944ccf14ee04feabae14.exe
    "C:\Users\Admin\AppData\Local\Temp\53be0b2d40689fedf42a5580d0d3b67bec0d74a45230944ccf14ee04feabae14.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4024

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4024-133-0x00007FFB91EA0000-0x00007FFB92961000-memory.dmp

    Filesize

    10.8MB

  • memory/4024-134-0x000001789DBD0000-0x000001789DBE0000-memory.dmp

    Filesize

    64KB

  • memory/4024-135-0x000001789DBD0000-0x000001789DBE0000-memory.dmp

    Filesize

    64KB

  • memory/4024-136-0x000001789DBD0000-0x000001789DBE0000-memory.dmp

    Filesize

    64KB

  • memory/4024-137-0x000001789DBD0000-0x000001789DBE0000-memory.dmp

    Filesize

    64KB

  • memory/4024-138-0x00000178A2F20000-0x00000178A2F28000-memory.dmp

    Filesize

    32KB

  • memory/4024-139-0x00000178A35B0000-0x00000178A35E8000-memory.dmp

    Filesize

    224KB

  • memory/4024-140-0x00000178A2F40000-0x00000178A2F4E000-memory.dmp

    Filesize

    56KB

  • memory/4024-153-0x00007FFB91EA0000-0x00007FFB92961000-memory.dmp

    Filesize

    10.8MB

  • memory/4024-154-0x000001789DBD0000-0x000001789DBE0000-memory.dmp

    Filesize

    64KB

  • memory/4024-155-0x000001789DBD0000-0x000001789DBE0000-memory.dmp

    Filesize

    64KB

  • memory/4024-156-0x000001789DBD0000-0x000001789DBE0000-memory.dmp

    Filesize

    64KB