Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-08-2023 13:56

General

  • Target

    d74b0c034547202de0da30e3379edffd19b6b5a435f98ae1a50daf51d55565f2.exe

  • Size

    1.4MB

  • MD5

    0025ebf9c555878b04539e064715c231

  • SHA1

    99b8e5a44669d05b9f565426fdcc49e619258f28

  • SHA256

    d74b0c034547202de0da30e3379edffd19b6b5a435f98ae1a50daf51d55565f2

  • SHA512

    0e64abbf57ad90280a8747ff29e1d65e86cb82b011de4d1ada64be5b38811e08db8263a175bf828c61f2c1141cc1c4dc7445c88c379cd982cff72f70142c9e01

  • SSDEEP

    24576:Y1W9WywGVswes3KbCdqmTu00YOFJ1/RvKYBHCj/usyahDSVXT5Xr:xMGjpdNT0DFJ1/RvKYBHk/r1GXT5X

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d74b0c034547202de0da30e3379edffd19b6b5a435f98ae1a50daf51d55565f2.exe
    "C:\Users\Admin\AppData\Local\Temp\d74b0c034547202de0da30e3379edffd19b6b5a435f98ae1a50daf51d55565f2.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4724

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4724-133-0x00007FFBEE290000-0x00007FFBEED51000-memory.dmp

    Filesize

    10.8MB

  • memory/4724-134-0x000001DDBF460000-0x000001DDBF470000-memory.dmp

    Filesize

    64KB

  • memory/4724-135-0x000001DDBF460000-0x000001DDBF470000-memory.dmp

    Filesize

    64KB

  • memory/4724-136-0x000001DDBF460000-0x000001DDBF470000-memory.dmp

    Filesize

    64KB

  • memory/4724-137-0x000001DDBF460000-0x000001DDBF470000-memory.dmp

    Filesize

    64KB

  • memory/4724-138-0x000001DDC3180000-0x000001DDC3188000-memory.dmp

    Filesize

    32KB

  • memory/4724-139-0x000001DDC3810000-0x000001DDC3848000-memory.dmp

    Filesize

    224KB

  • memory/4724-140-0x000001DDC31A0000-0x000001DDC31AE000-memory.dmp

    Filesize

    56KB

  • memory/4724-153-0x00007FFBEE290000-0x00007FFBEED51000-memory.dmp

    Filesize

    10.8MB

  • memory/4724-154-0x000001DDBF460000-0x000001DDBF470000-memory.dmp

    Filesize

    64KB

  • memory/4724-155-0x000001DDBF460000-0x000001DDBF470000-memory.dmp

    Filesize

    64KB

  • memory/4724-156-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB

  • memory/4724-157-0x000001DDBF460000-0x000001DDBF470000-memory.dmp

    Filesize

    64KB

  • memory/4724-158-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB

  • memory/4724-159-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB

  • memory/4724-160-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB

  • memory/4724-161-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB

  • memory/4724-162-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB

  • memory/4724-163-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB

  • memory/4724-164-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB

  • memory/4724-165-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB

  • memory/4724-166-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB

  • memory/4724-167-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB

  • memory/4724-168-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB

  • memory/4724-169-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB

  • memory/4724-170-0x000001DDBF470000-0x000001DDBF667000-memory.dmp

    Filesize

    2.0MB