Analysis

  • max time kernel
    167s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2023 01:11

General

  • Target

    922a1074571b97c63607f01e79707bbf70ce41bb1d1daced553ea2f66cfe03f0.exe

  • Size

    1.7MB

  • MD5

    b2c51218c051d37547ea42292076cc29

  • SHA1

    1a8775943885ddfc68dea9077a08893a724309a4

  • SHA256

    922a1074571b97c63607f01e79707bbf70ce41bb1d1daced553ea2f66cfe03f0

  • SHA512

    71dd746d18356f84970d304b77723a7379e3cd77aa1d654ab436ec1d3fc7de760f8579fa536a57d26f19e686930a77213dd22ccab4cdb1e3f428e73ee0228280

  • SSDEEP

    49152:BZJFqKpjCZd2j2dAxKLfwg6RT5lXT5XJxeNx1:PSnAxKjART5lD5fer1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\922a1074571b97c63607f01e79707bbf70ce41bb1d1daced553ea2f66cfe03f0.exe
    "C:\Users\Admin\AppData\Local\Temp\922a1074571b97c63607f01e79707bbf70ce41bb1d1daced553ea2f66cfe03f0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4668

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4668-0-0x000001EB21260000-0x000001EB21294000-memory.dmp

    Filesize

    208KB

  • memory/4668-1-0x00007FFF23BE0000-0x00007FFF246A1000-memory.dmp

    Filesize

    10.8MB

  • memory/4668-2-0x000001EB212F0000-0x000001EB21300000-memory.dmp

    Filesize

    64KB

  • memory/4668-3-0x000001EB212F0000-0x000001EB21300000-memory.dmp

    Filesize

    64KB

  • memory/4668-4-0x000001EB212F0000-0x000001EB21300000-memory.dmp

    Filesize

    64KB

  • memory/4668-5-0x000001EB3DA30000-0x000001EB3DA38000-memory.dmp

    Filesize

    32KB

  • memory/4668-6-0x000001EB3E0B0000-0x000001EB3E0E8000-memory.dmp

    Filesize

    224KB

  • memory/4668-7-0x000001EB3E070000-0x000001EB3E07E000-memory.dmp

    Filesize

    56KB

  • memory/4668-17-0x000001EB39C10000-0x000001EB39CAA000-memory.dmp

    Filesize

    616KB

  • memory/4668-18-0x000001EB39CB0000-0x000001EB39DCF000-memory.dmp

    Filesize

    1.1MB

  • memory/4668-22-0x00007FFF23BE0000-0x00007FFF246A1000-memory.dmp

    Filesize

    10.8MB

  • memory/4668-23-0x000001EB212F0000-0x000001EB21300000-memory.dmp

    Filesize

    64KB

  • memory/4668-24-0x000001EB212F0000-0x000001EB21300000-memory.dmp

    Filesize

    64KB

  • memory/4668-25-0x000001EB212F0000-0x000001EB21300000-memory.dmp

    Filesize

    64KB

  • memory/4668-26-0x000001EB212F0000-0x000001EB21300000-memory.dmp

    Filesize

    64KB