Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-09-2023 14:50

General

  • Target

    6eb89c9c0691f4d867461f626a893065bcafb7ab2a69ab532695d53663f4cea8.exe

  • Size

    1.3MB

  • MD5

    542cadda67fa1a85eb6f44e149b1f74e

  • SHA1

    83f228cb78e3b10e20b4c6dc33e20d6bb8e86be1

  • SHA256

    6eb89c9c0691f4d867461f626a893065bcafb7ab2a69ab532695d53663f4cea8

  • SHA512

    393b6782ffcd63c789d6336494bda2056fccf67da032e8084d793c7254f8cf531aeca586fcca2b2611b2aaaecbfbcbc823d96cd387ba20a4031fc08e86956c7c

  • SSDEEP

    24576:gEz7bV6A1g7id4KD5kcUV0neO1qp17JEIDSVXT5XhKUya:n7bV6A1Aid4KHUVL0qp1atXT5XT1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6eb89c9c0691f4d867461f626a893065bcafb7ab2a69ab532695d53663f4cea8.exe
    "C:\Users\Admin\AppData\Local\Temp\6eb89c9c0691f4d867461f626a893065bcafb7ab2a69ab532695d53663f4cea8.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4592

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4592-0-0x000001C3645F0000-0x000001C364624000-memory.dmp

    Filesize

    208KB

  • memory/4592-1-0x00007FFA74BF0000-0x00007FFA756B1000-memory.dmp

    Filesize

    10.8MB

  • memory/4592-2-0x000001C37D1F0000-0x000001C37D200000-memory.dmp

    Filesize

    64KB

  • memory/4592-3-0x000001C37D1F0000-0x000001C37D200000-memory.dmp

    Filesize

    64KB

  • memory/4592-4-0x000001C37D1F0000-0x000001C37D200000-memory.dmp

    Filesize

    64KB

  • memory/4592-5-0x000001C37D1F0000-0x000001C37D200000-memory.dmp

    Filesize

    64KB

  • memory/4592-6-0x000001C364BB0000-0x000001C364BB8000-memory.dmp

    Filesize

    32KB

  • memory/4592-8-0x000001C364BC0000-0x000001C364BCE000-memory.dmp

    Filesize

    56KB

  • memory/4592-7-0x000001C37D1B0000-0x000001C37D1E8000-memory.dmp

    Filesize

    224KB

  • memory/4592-21-0x00007FFA74BF0000-0x00007FFA756B1000-memory.dmp

    Filesize

    10.8MB

  • memory/4592-22-0x000001C37D1F0000-0x000001C37D200000-memory.dmp

    Filesize

    64KB

  • memory/4592-23-0x000001C37D1F0000-0x000001C37D200000-memory.dmp

    Filesize

    64KB

  • memory/4592-24-0x000001C37D1F0000-0x000001C37D200000-memory.dmp

    Filesize

    64KB