Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2023 23:54

General

  • Target

    943fd41f4c661612ba3201e9563f93f3fda4b9b66c5573cdf046e4d4d1406f9a.exe

  • Size

    1.9MB

  • MD5

    1f92027aa85d46dce6e2f727303b0acc

  • SHA1

    20d1a462717e733e502e4c0b424b88998f874eb7

  • SHA256

    943fd41f4c661612ba3201e9563f93f3fda4b9b66c5573cdf046e4d4d1406f9a

  • SHA512

    efc62c445adabbaf16c4c822b75363813bea6f7c5e1722a2090b59f85bbb875b5b7eabcc79784e0009dff1bfcb61bd86813802d26a0aec8fc97f2941e8ea6fa8

  • SSDEEP

    49152:51tlBBduVc9Qbsnk62WHznhXT5X1H2GNTA1w4:jPObsn1hD5zNTA17

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\943fd41f4c661612ba3201e9563f93f3fda4b9b66c5573cdf046e4d4d1406f9a.exe
    "C:\Users\Admin\AppData\Local\Temp\943fd41f4c661612ba3201e9563f93f3fda4b9b66c5573cdf046e4d4d1406f9a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/748-133-0x00007FFAE38E0000-0x00007FFAE43A1000-memory.dmp

    Filesize

    10.8MB

  • memory/748-134-0x000001F2F59E0000-0x000001F2F59F0000-memory.dmp

    Filesize

    64KB

  • memory/748-135-0x000001F2F59E0000-0x000001F2F59F0000-memory.dmp

    Filesize

    64KB

  • memory/748-136-0x000001F2F59E0000-0x000001F2F59F0000-memory.dmp

    Filesize

    64KB

  • memory/748-137-0x000001F2F59E0000-0x000001F2F59F0000-memory.dmp

    Filesize

    64KB

  • memory/748-138-0x000001F2F59E0000-0x000001F2F59F0000-memory.dmp

    Filesize

    64KB

  • memory/748-139-0x000001F2F59B0000-0x000001F2F59B8000-memory.dmp

    Filesize

    32KB

  • memory/748-140-0x000001F2F9D30000-0x000001F2F9D68000-memory.dmp

    Filesize

    224KB

  • memory/748-141-0x000001F2F59D0000-0x000001F2F59DE000-memory.dmp

    Filesize

    56KB

  • memory/748-154-0x00007FFAE38E0000-0x00007FFAE43A1000-memory.dmp

    Filesize

    10.8MB

  • memory/748-155-0x000001F2F59E0000-0x000001F2F59F0000-memory.dmp

    Filesize

    64KB

  • memory/748-156-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB

  • memory/748-157-0x000001F2F59E0000-0x000001F2F59F0000-memory.dmp

    Filesize

    64KB

  • memory/748-158-0x000001F2F59E0000-0x000001F2F59F0000-memory.dmp

    Filesize

    64KB

  • memory/748-159-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB

  • memory/748-160-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB

  • memory/748-161-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB

  • memory/748-162-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB

  • memory/748-163-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB

  • memory/748-164-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB

  • memory/748-165-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB

  • memory/748-166-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB

  • memory/748-167-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB

  • memory/748-168-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB

  • memory/748-169-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB

  • memory/748-170-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB

  • memory/748-171-0x000001F2F59F0000-0x000001F2F5BE7000-memory.dmp

    Filesize

    2.0MB