Analysis

  • max time kernel
    143s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-10-2023 17:57

General

  • Target

    a16fd6f293c9677ff6f5e8e04d1cdfb0589b269aa2acb85cb4a5cf19de758fd4.exe

  • Size

    1.5MB

  • MD5

    c8e4d6f6488c45c149a3f57ac2b25254

  • SHA1

    7aac4d376d4882bf2cb651776330c1d2e1733330

  • SHA256

    a16fd6f293c9677ff6f5e8e04d1cdfb0589b269aa2acb85cb4a5cf19de758fd4

  • SHA512

    151ef143010a19d14be59dbb05f1b3c923d435f3f5905150c6139bdf97413f48852dcb9fe345476cec545353db94dbbaf19051bd3c9c876080492e872ef2d3b3

  • SSDEEP

    24576:TFSmeL9l0GVEj6gfOIHi5NGya3AWOE0DSVXT5X1ZssoIt1:xyL9l0GVEOg5p1w4ZXT5X1Z3

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a16fd6f293c9677ff6f5e8e04d1cdfb0589b269aa2acb85cb4a5cf19de758fd4.exe
    "C:\Users\Admin\AppData\Local\Temp\a16fd6f293c9677ff6f5e8e04d1cdfb0589b269aa2acb85cb4a5cf19de758fd4.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4632

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4632-0-0x000002A2097D0000-0x000002A209804000-memory.dmp

    Filesize

    208KB

  • memory/4632-1-0x00007FFA082A0000-0x00007FFA08D61000-memory.dmp

    Filesize

    10.8MB

  • memory/4632-2-0x000002A209E10000-0x000002A209E20000-memory.dmp

    Filesize

    64KB

  • memory/4632-3-0x000002A209E10000-0x000002A209E20000-memory.dmp

    Filesize

    64KB

  • memory/4632-4-0x00007FFA082A0000-0x00007FFA08D61000-memory.dmp

    Filesize

    10.8MB

  • memory/4632-5-0x000002A209E10000-0x000002A209E20000-memory.dmp

    Filesize

    64KB

  • memory/4632-6-0x000002A209E10000-0x000002A209E20000-memory.dmp

    Filesize

    64KB

  • memory/4632-7-0x000002A209E10000-0x000002A209E20000-memory.dmp

    Filesize

    64KB

  • memory/4632-8-0x000002A209E10000-0x000002A209E20000-memory.dmp

    Filesize

    64KB

  • memory/4632-9-0x000002A227540000-0x000002A227548000-memory.dmp

    Filesize

    32KB

  • memory/4632-10-0x000002A209E10000-0x000002A209E20000-memory.dmp

    Filesize

    64KB

  • memory/4632-11-0x000002A227BC0000-0x000002A227BF8000-memory.dmp

    Filesize

    224KB

  • memory/4632-12-0x000002A227B80000-0x000002A227B8E000-memory.dmp

    Filesize

    56KB

  • memory/4632-14-0x00007FFA082A0000-0x00007FFA08D61000-memory.dmp

    Filesize

    10.8MB