Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2023 06:36

General

  • Target

    0455d6a2b4d7370169e78abd39ef9921a31a6a43a197f236d80b9f66f7c72033.exe

  • Size

    1.6MB

  • MD5

    3e569bb70a1cd30d02d7dc27f7b664ca

  • SHA1

    0c77b0c137188d6ef5ca60f93edc8e86ec4bef52

  • SHA256

    0455d6a2b4d7370169e78abd39ef9921a31a6a43a197f236d80b9f66f7c72033

  • SHA512

    3cced4213a171bdb4452fb402f58772afaeb916a7ac182482d831fb7bfaf587a241b911d3911e16deb192b75271a309b45975bf9b94a0dd6d675ee962360c1e1

  • SSDEEP

    49152:Ia68xs582wqhKHTTziAdeVhivXT5X7KG1:L01hKzbdeWD5WG1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0455d6a2b4d7370169e78abd39ef9921a31a6a43a197f236d80b9f66f7c72033.exe
    "C:\Users\Admin\AppData\Local\Temp\0455d6a2b4d7370169e78abd39ef9921a31a6a43a197f236d80b9f66f7c72033.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:216

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/216-0-0x000002034AF70000-0x000002034AFA4000-memory.dmp

    Filesize

    208KB

  • memory/216-1-0x00007FFD833B0000-0x00007FFD83E71000-memory.dmp

    Filesize

    10.8MB

  • memory/216-2-0x00000203639A0000-0x00000203639B0000-memory.dmp

    Filesize

    64KB

  • memory/216-3-0x00000203639A0000-0x00000203639B0000-memory.dmp

    Filesize

    64KB

  • memory/216-4-0x00000203639A0000-0x00000203639B0000-memory.dmp

    Filesize

    64KB

  • memory/216-5-0x00000203692C0000-0x00000203692C8000-memory.dmp

    Filesize

    32KB

  • memory/216-6-0x0000020369340000-0x0000020369378000-memory.dmp

    Filesize

    224KB

  • memory/216-7-0x0000020369310000-0x000002036931E000-memory.dmp

    Filesize

    56KB

  • memory/216-20-0x00007FFD833B0000-0x00007FFD83E71000-memory.dmp

    Filesize

    10.8MB

  • memory/216-21-0x00000203639A0000-0x00000203639B0000-memory.dmp

    Filesize

    64KB

  • memory/216-22-0x00000203639A0000-0x00000203639B0000-memory.dmp

    Filesize

    64KB