Analysis

  • max time kernel
    151s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 07:22

General

  • Target

    16eda190341d6d983bf1f42284e472c9fbf5b47b14ae123adfcd3766d019fc5e.exe

  • Size

    1.7MB

  • MD5

    a17bace3e74634e4f5757e150fb8b8ef

  • SHA1

    efd8a88d7b9e836ca8a5ce32106032007c5efc46

  • SHA256

    16eda190341d6d983bf1f42284e472c9fbf5b47b14ae123adfcd3766d019fc5e

  • SHA512

    212882530f910a0db1848cd55526d34cf80820b2b9bc38ad77d79fad952fb5549f53b22b76d97864264a0aab04ade0497fbaa9b9b24445a6f2111a9dc1439516

  • SSDEEP

    24576:gR41mlRpNJ6l0UKRC3QT0G1L2v1VdXN7fIDSVXT5XaWoOya:gG1oRMl0XRC3QT0Gxw1XT5XVN1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16eda190341d6d983bf1f42284e472c9fbf5b47b14ae123adfcd3766d019fc5e.exe
    "C:\Users\Admin\AppData\Local\Temp\16eda190341d6d983bf1f42284e472c9fbf5b47b14ae123adfcd3766d019fc5e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3752-0-0x0000018F604F0000-0x0000018F60524000-memory.dmp

    Filesize

    208KB

  • memory/3752-1-0x00007FFD7F620000-0x00007FFD800E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3752-4-0x0000018F79050000-0x0000018F79060000-memory.dmp

    Filesize

    64KB

  • memory/3752-3-0x0000018F79050000-0x0000018F79060000-memory.dmp

    Filesize

    64KB

  • memory/3752-2-0x0000018F79050000-0x0000018F79060000-memory.dmp

    Filesize

    64KB

  • memory/3752-5-0x0000018F79050000-0x0000018F79060000-memory.dmp

    Filesize

    64KB

  • memory/3752-6-0x0000018F79040000-0x0000018F79048000-memory.dmp

    Filesize

    32KB

  • memory/3752-7-0x0000018F79290000-0x0000018F792C8000-memory.dmp

    Filesize

    224KB

  • memory/3752-8-0x0000018F79250000-0x0000018F7925E000-memory.dmp

    Filesize

    56KB

  • memory/3752-21-0x00007FFD7F620000-0x00007FFD800E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3752-22-0x0000018F79050000-0x0000018F79060000-memory.dmp

    Filesize

    64KB

  • memory/3752-23-0x0000018F79050000-0x0000018F79060000-memory.dmp

    Filesize

    64KB

  • memory/3752-24-0x0000018F79050000-0x0000018F79060000-memory.dmp

    Filesize

    64KB

  • memory/3752-26-0x0000018F79050000-0x0000018F79060000-memory.dmp

    Filesize

    64KB

  • memory/3752-25-0x0000018F00A90000-0x0000018F00AD3000-memory.dmp

    Filesize

    268KB

  • memory/3752-27-0x0000018F79050000-0x0000018F79060000-memory.dmp

    Filesize

    64KB