Analysis

  • max time kernel
    152s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 04:58

General

  • Target

    9de80831f6f6e49ed0f2b43877b8995199bd16fedc6ac695a0054f52dc3e57fd.exe

  • Size

    438KB

  • MD5

    a05039fbc31bb0735cc7d47fad9c98a6

  • SHA1

    f1813729f7ad201760e5462ade9b100dedf0c84e

  • SHA256

    9de80831f6f6e49ed0f2b43877b8995199bd16fedc6ac695a0054f52dc3e57fd

  • SHA512

    36be674a4adf248a1ae561b0da2c41a142fadd5d280e3c4ed7a25fca4c67e6d5538fa52a8caa925cde3a99139a4b43361353f1a78ced30c9d0fa19877f2f37e4

  • SSDEEP

    6144:Q2vYg/KfSIBMDgW0L4FWa1yYMOgWQO2+071y6rpz0V:MgGSIu8OshYMUQOz6+

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9de80831f6f6e49ed0f2b43877b8995199bd16fedc6ac695a0054f52dc3e57fd.exe
    "C:\Users\Admin\AppData\Local\Temp\9de80831f6f6e49ed0f2b43877b8995199bd16fedc6ac695a0054f52dc3e57fd.exe"
    1⤵
      PID:2440
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:3768
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:520

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/520-4-0x000001F523040000-0x000001F523050000-memory.dmp

              Filesize

              64KB

            • memory/520-20-0x000001F523140000-0x000001F523150000-memory.dmp

              Filesize

              64KB

            • memory/520-36-0x000001F52B4A0000-0x000001F52B4A1000-memory.dmp

              Filesize

              4KB

            • memory/520-38-0x000001F52B4D0000-0x000001F52B4D1000-memory.dmp

              Filesize

              4KB

            • memory/520-40-0x000001F52B5E0000-0x000001F52B5E1000-memory.dmp

              Filesize

              4KB

            • memory/520-39-0x000001F52B4D0000-0x000001F52B4D1000-memory.dmp

              Filesize

              4KB

            • memory/2440-0-0x00007FF648D60000-0x00007FF648DD7000-memory.dmp

              Filesize

              476KB

            • memory/2440-2-0x00007FF9C6730000-0x00007FF9C685A000-memory.dmp

              Filesize

              1.2MB

            • memory/2440-3-0x00007FF648D60000-0x00007FF648DD7000-memory.dmp

              Filesize

              476KB