Analysis

  • max time kernel
    152s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2023 14:44

General

  • Target

    a0c52c51fcaf0a0d585d1ca08959c5f6177614d11c8c67f0983465a46c9751fa.exe

  • Size

    1.5MB

  • MD5

    2c412ed8a4e38a76a9c87e00aa711ce4

  • SHA1

    0a12168dbb53ed4ffa718fecebdb575a759e133b

  • SHA256

    a0c52c51fcaf0a0d585d1ca08959c5f6177614d11c8c67f0983465a46c9751fa

  • SHA512

    68ebbf702b51e4168a4c18bef5d30f02ccc914c1ca6d0bf413fcf6d18e95ae22f1ca4f880f46db1ada9d48e5b9672f02e693082ce820e44aa0e7e47596aebd1a

  • SSDEEP

    24576:kXTn6Gqx8kswyhvx0bV+OvNMlYZtYDSVXT5XU4W4Mkya3AWOE:EXqx8kswsvqzXT5X6S1w4

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0c52c51fcaf0a0d585d1ca08959c5f6177614d11c8c67f0983465a46c9751fa.exe
    "C:\Users\Admin\AppData\Local\Temp\a0c52c51fcaf0a0d585d1ca08959c5f6177614d11c8c67f0983465a46c9751fa.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2776

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2776-0-0x0000012ADCED0000-0x0000012ADCF04000-memory.dmp

    Filesize

    208KB

  • memory/2776-1-0x00007FFB67A50000-0x00007FFB68511000-memory.dmp

    Filesize

    10.8MB

  • memory/2776-2-0x0000012ADD3E0000-0x0000012ADD3F0000-memory.dmp

    Filesize

    64KB

  • memory/2776-3-0x0000012ADD3E0000-0x0000012ADD3F0000-memory.dmp

    Filesize

    64KB

  • memory/2776-4-0x0000012ADD3E0000-0x0000012ADD3F0000-memory.dmp

    Filesize

    64KB

  • memory/2776-5-0x0000012ADD3E0000-0x0000012ADD3F0000-memory.dmp

    Filesize

    64KB

  • memory/2776-6-0x00007FFB67A50000-0x00007FFB68511000-memory.dmp

    Filesize

    10.8MB

  • memory/2776-7-0x0000012ADD3E0000-0x0000012ADD3F0000-memory.dmp

    Filesize

    64KB

  • memory/2776-9-0x0000012ADD3E0000-0x0000012ADD3F0000-memory.dmp

    Filesize

    64KB

  • memory/2776-10-0x0000012AF6430000-0x0000012AF6438000-memory.dmp

    Filesize

    32KB

  • memory/2776-8-0x0000012ADD3E0000-0x0000012ADD3F0000-memory.dmp

    Filesize

    64KB

  • memory/2776-11-0x0000012AF66C0000-0x0000012AF66F8000-memory.dmp

    Filesize

    224KB

  • memory/2776-12-0x0000012AF6480000-0x0000012AF648E000-memory.dmp

    Filesize

    56KB

  • memory/2776-13-0x0000012ADD3E0000-0x0000012ADD3F0000-memory.dmp

    Filesize

    64KB

  • memory/2776-26-0x0000012ADD3E0000-0x0000012ADD3F0000-memory.dmp

    Filesize

    64KB

  • memory/2776-27-0x0000012ADD3E0000-0x0000012ADD3F0000-memory.dmp

    Filesize

    64KB