Analysis

  • max time kernel
    44s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2023 15:37

General

  • Target

    vmlogger.exe

  • Size

    17KB

  • MD5

    e439f1e411de7b0a360c455c2cee16dc

  • SHA1

    739db934ebe4ace1c70fc3687d1288676ba7a498

  • SHA256

    73dad85067ee58e3123d2c09b7142219929cb70aa64f60d8609e6acfa317e795

  • SHA512

    8380662a1d3aef9ed9496c3f61cad40b493f62b941c44f5045623a57ecd62585cba29f82a15a891dcc0b267accfb0d054c2b7d73b81699541a6519f06f293ea4

  • SSDEEP

    384:eZPB7vCu+K+Nltdm38krvKZyg88fMgcNM1EMwC1/:eRB7vCu+K+/tQsk7KyWMgYC1

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vmlogger.exe
    "C:\Users\Admin\AppData\Local\Temp\vmlogger.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3776

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3776-0-0x00000233BF380000-0x00000233BF38A000-memory.dmp

    Filesize

    40KB

  • memory/3776-1-0x00007FFDBFEF0000-0x00007FFDC09B1000-memory.dmp

    Filesize

    10.8MB

  • memory/3776-2-0x00000233BF740000-0x00000233BF750000-memory.dmp

    Filesize

    64KB

  • memory/3776-3-0x00007FFDBFEF0000-0x00007FFDC09B1000-memory.dmp

    Filesize

    10.8MB

  • memory/3776-4-0x00000233BF740000-0x00000233BF750000-memory.dmp

    Filesize

    64KB