Analysis

  • max time kernel
    168s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2023 02:45

General

  • Target

    fedce58c059ae23c72c6ab2a9e5d2aa6732d5f1a19e677ced89da267dab614fc.exe

  • Size

    1.3MB

  • MD5

    b1a8871d431a77b73848b37a191fc4a1

  • SHA1

    67b63ab96f954fd20a962be472a22f4d703d2a75

  • SHA256

    fedce58c059ae23c72c6ab2a9e5d2aa6732d5f1a19e677ced89da267dab614fc

  • SHA512

    c6bf8acc716cdc55d89441e44caf6eea00db1cd8c50e14f0bbf1955b324313707cd4b2629b86f19c3bb9cf3f413c7d75d390aa531f17c1cd72c8ef2041286c6f

  • SSDEEP

    24576:L8EvQaj/4D80cuEgesvILa/2IATCBPr0Bxv2cW1BZyaPDSVXT5X:4Exj/4D8duEgRvd2k4R2cWx1sXT5X

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fedce58c059ae23c72c6ab2a9e5d2aa6732d5f1a19e677ced89da267dab614fc.exe
    "C:\Users\Admin\AppData\Local\Temp\fedce58c059ae23c72c6ab2a9e5d2aa6732d5f1a19e677ced89da267dab614fc.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3884

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3884-0-0x000001A213760000-0x000001A213794000-memory.dmp

    Filesize

    208KB

  • memory/3884-1-0x00007FFDAE2B0000-0x00007FFDAED71000-memory.dmp

    Filesize

    10.8MB

  • memory/3884-3-0x000001A22C260000-0x000001A22C270000-memory.dmp

    Filesize

    64KB

  • memory/3884-2-0x000001A22C260000-0x000001A22C270000-memory.dmp

    Filesize

    64KB

  • memory/3884-4-0x000001A22C260000-0x000001A22C270000-memory.dmp

    Filesize

    64KB

  • memory/3884-5-0x00007FFDAE2B0000-0x00007FFDAED71000-memory.dmp

    Filesize

    10.8MB

  • memory/3884-6-0x000001A22C260000-0x000001A22C270000-memory.dmp

    Filesize

    64KB

  • memory/3884-7-0x000001A22C260000-0x000001A22C270000-memory.dmp

    Filesize

    64KB

  • memory/3884-8-0x000001A22C260000-0x000001A22C270000-memory.dmp

    Filesize

    64KB

  • memory/3884-9-0x000001A22C260000-0x000001A22C270000-memory.dmp

    Filesize

    64KB

  • memory/3884-10-0x000001A22C260000-0x000001A22C270000-memory.dmp

    Filesize

    64KB

  • memory/3884-11-0x000001A22C260000-0x000001A22C270000-memory.dmp

    Filesize

    64KB

  • memory/3884-12-0x000001A22C260000-0x000001A22C270000-memory.dmp

    Filesize

    64KB

  • memory/3884-13-0x000001A22DCD0000-0x000001A22DCD8000-memory.dmp

    Filesize

    32KB

  • memory/3884-14-0x000001A2317A0000-0x000001A2317D8000-memory.dmp

    Filesize

    224KB

  • memory/3884-15-0x000001A231770000-0x000001A23177E000-memory.dmp

    Filesize

    56KB

  • memory/3884-17-0x00007FFDAE2B0000-0x00007FFDAED71000-memory.dmp

    Filesize

    10.8MB