Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/09/2023, 21:50

General

  • Target

    026728eb0454ab841f2383cb31ef987872d7e48a745e64575d8eb0821f056f2a.exe

  • Size

    188KB

  • MD5

    55f1601b3b35304881ac7279920fc059

  • SHA1

    dbd61b44b0de91da661260196f43a5eaf79cd75d

  • SHA256

    026728eb0454ab841f2383cb31ef987872d7e48a745e64575d8eb0821f056f2a

  • SHA512

    00fbab998beda20034efd7adacfdc4c2d6102e78e09252ebc4c225184937ecafbccdeea0c94b9844969e0a1c75c634c99adf3928e8d3f4bb46f5d4f51be4465d

  • SSDEEP

    1536:qjMqxL2Q3qOLj5MH1Y3pqYYQe4Xo9D/WBfgLdQAQfhJIJ0IO61j0MUf:sAyL9I1YRYKX+TWBftffhJCuUj0

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\026728eb0454ab841f2383cb31ef987872d7e48a745e64575d8eb0821f056f2a.exe
    "C:\Users\Admin\AppData\Local\Temp\026728eb0454ab841f2383cb31ef987872d7e48a745e64575d8eb0821f056f2a.exe"
    1⤵
      PID:4688
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4520
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1144

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1144-2-0x000001EAF3960000-0x000001EAF3970000-memory.dmp

        Filesize

        64KB

      • memory/1144-18-0x000001EAF3A60000-0x000001EAF3A70000-memory.dmp

        Filesize

        64KB

      • memory/1144-34-0x000001EAFBDD0000-0x000001EAFBDD1000-memory.dmp

        Filesize

        4KB

      • memory/1144-36-0x000001EAFBE00000-0x000001EAFBE01000-memory.dmp

        Filesize

        4KB

      • memory/1144-37-0x000001EAFBE00000-0x000001EAFBE01000-memory.dmp

        Filesize

        4KB

      • memory/1144-38-0x000001EAFBF10000-0x000001EAFBF11000-memory.dmp

        Filesize

        4KB

      • memory/4688-0-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB

      • memory/4688-1-0x0000000000400000-0x0000000000435000-memory.dmp

        Filesize

        212KB