Analysis

  • max time kernel
    148s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-10-2023 16:56

General

  • Target

    file.exe

  • Size

    2.1MB

  • MD5

    739cd8857e03f0dbbff8864d6786469f

  • SHA1

    c088900d9d6cab0a143d0a5c7fdfcea2c83dc9d3

  • SHA256

    4fd569390a431229cf3576cfc60eb957cf4a69ccc5081946adcd8fb8028861b1

  • SHA512

    b5b82d7b6158a76c17ddd4903223e03e47607b98a39809472316e8df3171f2e077e8e295e16a396edd5666ab644cf6ec0ad1b4c4e5d2dac00b502ec54e2cddc5

  • SSDEEP

    24576:NAbi6yQG2WZPEzW1ND4yT+/PNPo6aIFIsUD7Q2CA+oT5LQJ:SUD5ZPEzW1ti/NoYFwQ2CoyJ

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3776

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3776-0-0x0000000000710000-0x0000000000938000-memory.dmp

    Filesize

    2.2MB

  • memory/3776-1-0x00007FFD21250000-0x00007FFD21D11000-memory.dmp

    Filesize

    10.8MB

  • memory/3776-2-0x000000001C830000-0x000000001C840000-memory.dmp

    Filesize

    64KB

  • memory/3776-3-0x00000000012D0000-0x00000000012D1000-memory.dmp

    Filesize

    4KB

  • memory/3776-5-0x00007FFD21250000-0x00007FFD21D11000-memory.dmp

    Filesize

    10.8MB