Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-08-2023 11:57

General

  • Target

    1278def356481e0703dda0ee7f07627e225e9a127a0790222ca9cf1dde89ebc6.exe

  • Size

    1.3MB

  • MD5

    3689ddc0f416cfc5f99e7657988c9154

  • SHA1

    1bfa1a8df576a2a5229e02bb8f40a292725f29f0

  • SHA256

    1278def356481e0703dda0ee7f07627e225e9a127a0790222ca9cf1dde89ebc6

  • SHA512

    a78eb5b7d87c35d72c5b9d5f8df5fe965555cc92c4aa85fba86c7f398f86cf964b171be53ffae9b56364fb4cd4244e93100091a83305795091202408f43d408f

  • SSDEEP

    24576:194/vBsz9+hwwMSGs9649qad2Az5ZDSVXT5XF6Uzwoya:4/vBsz9+NMSGsBEAz5OXT5XF6UV1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1278def356481e0703dda0ee7f07627e225e9a127a0790222ca9cf1dde89ebc6.exe
    "C:\Users\Admin\AppData\Local\Temp\1278def356481e0703dda0ee7f07627e225e9a127a0790222ca9cf1dde89ebc6.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4428

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4428-1-0x0000029F389C0000-0x0000029F389D0000-memory.dmp

    Filesize

    64KB

  • memory/4428-0-0x00007FFF28030000-0x00007FFF28AF1000-memory.dmp

    Filesize

    10.8MB

  • memory/4428-2-0x0000029F389C0000-0x0000029F389D0000-memory.dmp

    Filesize

    64KB

  • memory/4428-3-0x0000029F389C0000-0x0000029F389D0000-memory.dmp

    Filesize

    64KB

  • memory/4428-4-0x0000029F389C0000-0x0000029F389D0000-memory.dmp

    Filesize

    64KB

  • memory/4428-5-0x0000029F389B0000-0x0000029F389B8000-memory.dmp

    Filesize

    32KB

  • memory/4428-6-0x0000029F3E320000-0x0000029F3E358000-memory.dmp

    Filesize

    224KB

  • memory/4428-7-0x0000029F3E2F0000-0x0000029F3E2FE000-memory.dmp

    Filesize

    56KB

  • memory/4428-20-0x00007FFF28030000-0x00007FFF28AF1000-memory.dmp

    Filesize

    10.8MB

  • memory/4428-21-0x0000029F389C0000-0x0000029F389D0000-memory.dmp

    Filesize

    64KB

  • memory/4428-22-0x0000029F389C0000-0x0000029F389D0000-memory.dmp

    Filesize

    64KB

  • memory/4428-23-0x0000029F389C0000-0x0000029F389D0000-memory.dmp

    Filesize

    64KB

  • memory/4428-24-0x0000029F389C0000-0x0000029F389D0000-memory.dmp

    Filesize

    64KB

  • memory/4428-25-0x0000029F389C0000-0x0000029F389D0000-memory.dmp

    Filesize

    64KB