Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2023 12:19

General

  • Target

    c0405acb861ddb7edd050c97bd4d5aae9ec089c9dd54adf721dfbc842ebb1661.exe

  • Size

    2.0MB

  • MD5

    5382aefed08597a45e6ef8836fdb70c5

  • SHA1

    4a25798bee301f4e021ad8c521300b5adc2b8250

  • SHA256

    c0405acb861ddb7edd050c97bd4d5aae9ec089c9dd54adf721dfbc842ebb1661

  • SHA512

    e2189bdc9bb94b88bd39d578f4eb63d5a5bb67dd0d47b52d7017ab453726fe7ae068d9741fa3b985fa2cff2472035cac670697b815af668bb9aed46a128b5414

  • SSDEEP

    49152:Zu89M2GKnlX6WxmchZheq82m0XT5XzBh1:VrQchl00D5j/1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0405acb861ddb7edd050c97bd4d5aae9ec089c9dd54adf721dfbc842ebb1661.exe
    "C:\Users\Admin\AppData\Local\Temp\c0405acb861ddb7edd050c97bd4d5aae9ec089c9dd54adf721dfbc842ebb1661.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2060-0-0x000001E37F150000-0x000001E37F184000-memory.dmp

    Filesize

    208KB

  • memory/2060-1-0x00007FFA20600000-0x00007FFA210C1000-memory.dmp

    Filesize

    10.8MB

  • memory/2060-2-0x000001E37FCE0000-0x000001E37FCF0000-memory.dmp

    Filesize

    64KB

  • memory/2060-3-0x000001E37FCE0000-0x000001E37FCF0000-memory.dmp

    Filesize

    64KB

  • memory/2060-4-0x000001E37FCE0000-0x000001E37FCF0000-memory.dmp

    Filesize

    64KB

  • memory/2060-5-0x000001E37FCE0000-0x000001E37FCF0000-memory.dmp

    Filesize

    64KB

  • memory/2060-6-0x000001E37F1A0000-0x000001E37F1A8000-memory.dmp

    Filesize

    32KB

  • memory/2060-7-0x000001E37F570000-0x000001E37F5A8000-memory.dmp

    Filesize

    224KB

  • memory/2060-8-0x000001E37F1B0000-0x000001E37F1BE000-memory.dmp

    Filesize

    56KB

  • memory/2060-11-0x00007FFA20600000-0x00007FFA210C1000-memory.dmp

    Filesize

    10.8MB

  • memory/2060-12-0x000001E37FCE0000-0x000001E37FCF0000-memory.dmp

    Filesize

    64KB

  • memory/2060-13-0x000001E37FCE0000-0x000001E37FCF0000-memory.dmp

    Filesize

    64KB

  • memory/2060-15-0x000001E37FCE0000-0x000001E37FCF0000-memory.dmp

    Filesize

    64KB

  • memory/2060-16-0x000001E37FCE0000-0x000001E37FCF0000-memory.dmp

    Filesize

    64KB