Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2023 13:48

General

  • Target

    Deceive.exe

  • Size

    1.3MB

  • MD5

    b64c8f11de6b74f733a14bb6d531f5f8

  • SHA1

    0fe0f96ff1c46c611227c233aab8815611f424de

  • SHA256

    766754b253ac0a77707755374a91856f1914cdb5678494bc07f6bd3e37cab89a

  • SHA512

    19d4b9a94085113c69060e4ba46eb5197179ccb530ea1facd80df3da9969e94a0124d73e2b3be94a1d3de3816047fe4e51df3f46fce9f45e59e5da7d2b6a4437

  • SSDEEP

    24576:Wjj1jWV0il9s7yHjTjCJTd08imlKfITk5BkAptcxBOqDVphkgRUpbwxhJ:WjRS+i3s7yHjTjCv08llAIIcC6BOqDV3

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Deceive.exe
    "C:\Users\Admin\AppData\Local\Temp\Deceive.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4384

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4384-0-0x000002174CE80000-0x000002174CFDE000-memory.dmp

    Filesize

    1.4MB

  • memory/4384-1-0x00007FFDEF4A0000-0x00007FFDEFF61000-memory.dmp

    Filesize

    10.8MB

  • memory/4384-2-0x000002174D390000-0x000002174D3A0000-memory.dmp

    Filesize

    64KB

  • memory/4384-3-0x000002174D380000-0x000002174D38C000-memory.dmp

    Filesize

    48KB

  • memory/4384-4-0x000002174D450000-0x000002174D46A000-memory.dmp

    Filesize

    104KB

  • memory/4384-5-0x000002174ED40000-0x000002174ED7A000-memory.dmp

    Filesize

    232KB

  • memory/4384-6-0x000002174D430000-0x000002174D448000-memory.dmp

    Filesize

    96KB

  • memory/4384-7-0x000002174D470000-0x000002174D478000-memory.dmp

    Filesize

    32KB

  • memory/4384-8-0x000002174D3A0000-0x000002174D3B0000-memory.dmp

    Filesize

    64KB

  • memory/4384-9-0x0000021767570000-0x0000021767596000-memory.dmp

    Filesize

    152KB

  • memory/4384-10-0x00000217675D0000-0x00000217675D8000-memory.dmp

    Filesize

    32KB

  • memory/4384-12-0x0000021767720000-0x00000217677A2000-memory.dmp

    Filesize

    520KB

  • memory/4384-13-0x00000217684A0000-0x00000217684AA000-memory.dmp

    Filesize

    40KB

  • memory/4384-14-0x00000217684B0000-0x00000217684CE000-memory.dmp

    Filesize

    120KB

  • memory/4384-15-0x00007FFDEF4A0000-0x00007FFDEFF61000-memory.dmp

    Filesize

    10.8MB

  • memory/4384-16-0x00000217684D0000-0x00000217684DA000-memory.dmp

    Filesize

    40KB

  • memory/4384-18-0x00000217684F0000-0x0000021768506000-memory.dmp

    Filesize

    88KB

  • memory/4384-17-0x00000217684E0000-0x00000217684EA000-memory.dmp

    Filesize

    40KB

  • memory/4384-19-0x00000217680B0000-0x00000217681B2000-memory.dmp

    Filesize

    1.0MB

  • memory/4384-20-0x000002174D390000-0x000002174D3A0000-memory.dmp

    Filesize

    64KB

  • memory/4384-23-0x00000217680B0000-0x00000217681B2000-memory.dmp

    Filesize

    1.0MB

  • memory/4384-24-0x00007FFDEF4A0000-0x00007FFDEFF61000-memory.dmp

    Filesize

    10.8MB