Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-10-2023 16:30

General

  • Target

    5267533e965df230fdb32c4df28ec800468740d86db4656d6c7743b064d69700.exe

  • Size

    4.5MB

  • MD5

    434db5772c100848fe2eec72ef78f2d8

  • SHA1

    e7c293134889f3876ba85d3761c546dd2929410a

  • SHA256

    5267533e965df230fdb32c4df28ec800468740d86db4656d6c7743b064d69700

  • SHA512

    1141ec96bb1847b0d99f8ee0cd5e601f4196a2b2926c929dfa47a4c911927a08b804dc0465afd587f4139a83519a76971fd00fdf3f21c1b74eda5f1e1971e2c2

  • SSDEEP

    98304:A+B8SsrNL0RjofZFJvSR2YnaFLOAkGkzdnEVomFHKnP:A+orNLOofQR2YaFLOyomFHKnP

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5267533e965df230fdb32c4df28ec800468740d86db4656d6c7743b064d69700.exe
    "C:\Users\Admin\AppData\Local\Temp\5267533e965df230fdb32c4df28ec800468740d86db4656d6c7743b064d69700.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2340

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\config.ini

    Filesize

    43B

    MD5

    9703a8e078e48580d8d5b003068b553f

    SHA1

    de26c45923424cdd3b789e8fe6065a487b618165

    SHA256

    431fb9ba6340338bac9d5222223be7c9e01cc9ac81d5535401707dcc3ee680c4

    SHA512

    499d085153021343ef7e1075ceb2a23b3985ef68e29ae1aa7a7172608ddf097d00f1979a29a7117be1b90e28ebd5fe6a7379f1fb29acaa8425284716b0d04987