Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2023 17:06

General

  • Target

    2cae9e29b14c7504b2e01c768a3def9d16b6989a6dbccec69c7b9cf1e2e354b8.exe

  • Size

    1.3MB

  • MD5

    749b03555942246ddcaca666a305ade2

  • SHA1

    078c577c5dec4fca0e0c339a22086a15b61aa363

  • SHA256

    2cae9e29b14c7504b2e01c768a3def9d16b6989a6dbccec69c7b9cf1e2e354b8

  • SHA512

    df5afd78b153439d135347cfcdcaf2998cbe7706f4a573a228a4bddf3e3d354cf377ede02bc2b90b2d44b78d122790727c6f37c10821bad29a4c3ff6d05a740c

  • SSDEEP

    24576:ebAyA7/TjNuExd+oHJq4k7Uw+lTUtDSVXT5X7/2xSNUBya:QxA7/TjNumdYIlXT5X7H81

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cae9e29b14c7504b2e01c768a3def9d16b6989a6dbccec69c7b9cf1e2e354b8.exe
    "C:\Users\Admin\AppData\Local\Temp\2cae9e29b14c7504b2e01c768a3def9d16b6989a6dbccec69c7b9cf1e2e354b8.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3328

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3328-0-0x0000016ECE130000-0x0000016ECE164000-memory.dmp

    Filesize

    208KB

  • memory/3328-1-0x00007FF9A6330000-0x00007FF9A6DF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3328-2-0x0000016EE67E0000-0x0000016EE67F0000-memory.dmp

    Filesize

    64KB

  • memory/3328-3-0x0000016EE67E0000-0x0000016EE67F0000-memory.dmp

    Filesize

    64KB

  • memory/3328-4-0x0000016EE67E0000-0x0000016EE67F0000-memory.dmp

    Filesize

    64KB

  • memory/3328-5-0x0000016EE67E0000-0x0000016EE67F0000-memory.dmp

    Filesize

    64KB

  • memory/3328-6-0x0000016EE8180000-0x0000016EE8188000-memory.dmp

    Filesize

    32KB

  • memory/3328-7-0x0000016EE8410000-0x0000016EE8448000-memory.dmp

    Filesize

    224KB

  • memory/3328-8-0x0000016EE81D0000-0x0000016EE81DE000-memory.dmp

    Filesize

    56KB

  • memory/3328-21-0x00007FF9A6330000-0x00007FF9A6DF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3328-22-0x0000016EE67E0000-0x0000016EE67F0000-memory.dmp

    Filesize

    64KB

  • memory/3328-23-0x0000016EE67E0000-0x0000016EE67F0000-memory.dmp

    Filesize

    64KB

  • memory/3328-24-0x0000016EE67E0000-0x0000016EE67F0000-memory.dmp

    Filesize

    64KB

  • memory/3328-25-0x0000016EE67E0000-0x0000016EE67F0000-memory.dmp

    Filesize

    64KB