Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2023 07:26

General

  • Target

    c6cc477072623ffc2dec5314acd78815a6f2e024da148ff79bf2d1f2b3dea297.exe

  • Size

    1.8MB

  • MD5

    09bcb1cd397557657760e1e10e72c3bf

  • SHA1

    6826460e8c48e4ebc5ebe320090d6720f95d2c23

  • SHA256

    c6cc477072623ffc2dec5314acd78815a6f2e024da148ff79bf2d1f2b3dea297

  • SHA512

    04f2e5a82fe1e54aa9bb80d4330a4acb147de86e84c25e83dda200776eaa2a627cfe6cf3a1b8f120360f7f731d680e6d57ff6327efc30636c84dd961d3fc7fb9

  • SSDEEP

    24576:UJptrSpWtyl4xuxzacxc4kUWLpe/skSkHcQUTlq9B2ePqAN7M:U1rWWtym+Wc/sXQUTcB5J7M

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6cc477072623ffc2dec5314acd78815a6f2e024da148ff79bf2d1f2b3dea297.exe
    "C:\Users\Admin\AppData\Local\Temp\c6cc477072623ffc2dec5314acd78815a6f2e024da148ff79bf2d1f2b3dea297.exe"
    1⤵
      PID:1044
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4808
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4256

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4256-0-0x000001C80A8B0000-0x000001C80A8C0000-memory.dmp

        Filesize

        64KB

      • memory/4256-16-0x000001C80A9B0000-0x000001C80A9C0000-memory.dmp

        Filesize

        64KB

      • memory/4256-32-0x000001C812FA0000-0x000001C812FA1000-memory.dmp

        Filesize

        4KB

      • memory/4256-33-0x000001C812FD0000-0x000001C812FD1000-memory.dmp

        Filesize

        4KB

      • memory/4256-34-0x000001C812FD0000-0x000001C812FD1000-memory.dmp

        Filesize

        4KB

      • memory/4256-35-0x000001C812FD0000-0x000001C812FD1000-memory.dmp

        Filesize

        4KB

      • memory/4256-36-0x000001C812FD0000-0x000001C812FD1000-memory.dmp

        Filesize

        4KB

      • memory/4256-37-0x000001C812FD0000-0x000001C812FD1000-memory.dmp

        Filesize

        4KB

      • memory/4256-38-0x000001C812FD0000-0x000001C812FD1000-memory.dmp

        Filesize

        4KB

      • memory/4256-39-0x000001C812FD0000-0x000001C812FD1000-memory.dmp

        Filesize

        4KB

      • memory/4256-40-0x000001C812FD0000-0x000001C812FD1000-memory.dmp

        Filesize

        4KB

      • memory/4256-41-0x000001C812FD0000-0x000001C812FD1000-memory.dmp

        Filesize

        4KB

      • memory/4256-42-0x000001C812FD0000-0x000001C812FD1000-memory.dmp

        Filesize

        4KB

      • memory/4256-43-0x000001C812BF0000-0x000001C812BF1000-memory.dmp

        Filesize

        4KB

      • memory/4256-44-0x000001C812BE0000-0x000001C812BE1000-memory.dmp

        Filesize

        4KB

      • memory/4256-46-0x000001C812BF0000-0x000001C812BF1000-memory.dmp

        Filesize

        4KB

      • memory/4256-49-0x000001C812BE0000-0x000001C812BE1000-memory.dmp

        Filesize

        4KB

      • memory/4256-52-0x000001C812B20000-0x000001C812B21000-memory.dmp

        Filesize

        4KB

      • memory/4256-64-0x000001C812D20000-0x000001C812D21000-memory.dmp

        Filesize

        4KB

      • memory/4256-66-0x000001C812D30000-0x000001C812D31000-memory.dmp

        Filesize

        4KB

      • memory/4256-67-0x000001C812D30000-0x000001C812D31000-memory.dmp

        Filesize

        4KB

      • memory/4256-68-0x000001C812E40000-0x000001C812E41000-memory.dmp

        Filesize

        4KB