Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-09-2023 07:33

General

  • Target

    06ae0bc6e8633cb703c53b5fa16dbea5d5babef4fcc3e28f529666e0ed98f2c1.exe

  • Size

    1.3MB

  • MD5

    fa89efc4ea8cbf5926f66164439a1efa

  • SHA1

    3b9fcae504c8bb290d45f497e77ae67adde8f4fb

  • SHA256

    06ae0bc6e8633cb703c53b5fa16dbea5d5babef4fcc3e28f529666e0ed98f2c1

  • SHA512

    78acd657e56ca627239ea77dffad5b23494973752bee3e93217ed3ed6253c7c4740297f542debf88bbb878992b59e9961d5e11b553248406a3bef2b1d651fdfb

  • SSDEEP

    24576:C2L0RVrY4rxYGgVIHSAwSeXEoHRFBDSVXT5X6lM744ZUCBya:CwiVrY4rx5gVIHSAidHOXT5XKMb9B1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06ae0bc6e8633cb703c53b5fa16dbea5d5babef4fcc3e28f529666e0ed98f2c1.exe
    "C:\Users\Admin\AppData\Local\Temp\06ae0bc6e8633cb703c53b5fa16dbea5d5babef4fcc3e28f529666e0ed98f2c1.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4128

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4128-0-0x000001D6D13C0000-0x000001D6D13F4000-memory.dmp

    Filesize

    208KB

  • memory/4128-1-0x00007FFE464B0000-0x00007FFE46F71000-memory.dmp

    Filesize

    10.8MB

  • memory/4128-2-0x000001D6D1460000-0x000001D6D1470000-memory.dmp

    Filesize

    64KB

  • memory/4128-3-0x000001D6D1460000-0x000001D6D1470000-memory.dmp

    Filesize

    64KB

  • memory/4128-4-0x000001D6D1460000-0x000001D6D1470000-memory.dmp

    Filesize

    64KB

  • memory/4128-5-0x000001D6EB7E0000-0x000001D6EB7E8000-memory.dmp

    Filesize

    32KB

  • memory/4128-6-0x000001D6EECD0000-0x000001D6EED08000-memory.dmp

    Filesize

    224KB

  • memory/4128-7-0x000001D6EEC90000-0x000001D6EEC9E000-memory.dmp

    Filesize

    56KB

  • memory/4128-11-0x00007FFE464B0000-0x00007FFE46F71000-memory.dmp

    Filesize

    10.8MB

  • memory/4128-12-0x000001D6D1460000-0x000001D6D1470000-memory.dmp

    Filesize

    64KB

  • memory/4128-13-0x000001D6D1460000-0x000001D6D1470000-memory.dmp

    Filesize

    64KB

  • memory/4128-14-0x000001D6D1460000-0x000001D6D1470000-memory.dmp

    Filesize

    64KB

  • memory/4128-15-0x000001D6D1460000-0x000001D6D1470000-memory.dmp

    Filesize

    64KB

  • memory/4128-16-0x000001D6D1460000-0x000001D6D1470000-memory.dmp

    Filesize

    64KB