Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2023 07:37

General

  • Target

    ffa9d244b958400c7202bea2aae8e2250db6834f75d07738ff2e0d2bfd46e99a.exe

  • Size

    1.7MB

  • MD5

    e9959d5d7da59ecf59c3e896e3ffc1a2

  • SHA1

    ae7f313b532c745258ae4a2e4e6a0e4989aaaa6a

  • SHA256

    ffa9d244b958400c7202bea2aae8e2250db6834f75d07738ff2e0d2bfd46e99a

  • SHA512

    af98de1bbe4e2c55b9b1ec27bebd2f1a28576604e766e521f47ff8047b5a0698747565aaef5195fb67c61d365fb429618a10beb6a90d8dd8a90264614c0de5d3

  • SSDEEP

    24576:K13aVfmYOXPJ8ZYIJ9+J/M+6CrMZrb7agWmDSVXT5XF8q1hYMya:K1qV9OXqZYI6J/M+Ncn+gWrXT5XYM1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffa9d244b958400c7202bea2aae8e2250db6834f75d07738ff2e0d2bfd46e99a.exe
    "C:\Users\Admin\AppData\Local\Temp\ffa9d244b958400c7202bea2aae8e2250db6834f75d07738ff2e0d2bfd46e99a.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3932-0-0x0000020B4EF50000-0x0000020B4EF84000-memory.dmp

    Filesize

    208KB

  • memory/3932-1-0x00007FFB40B20000-0x00007FFB415E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3932-2-0x0000020B4F480000-0x0000020B4F490000-memory.dmp

    Filesize

    64KB

  • memory/3932-3-0x0000020B4F480000-0x0000020B4F490000-memory.dmp

    Filesize

    64KB

  • memory/3932-4-0x0000020B4F480000-0x0000020B4F490000-memory.dmp

    Filesize

    64KB

  • memory/3932-5-0x0000020B4F4C0000-0x0000020B4F4C8000-memory.dmp

    Filesize

    32KB

  • memory/3932-6-0x0000020B6D320000-0x0000020B6D358000-memory.dmp

    Filesize

    224KB

  • memory/3932-7-0x0000020B6D2F0000-0x0000020B6D2FE000-memory.dmp

    Filesize

    56KB

  • memory/3932-20-0x00007FFB40B20000-0x00007FFB415E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3932-21-0x0000020B4F480000-0x0000020B4F490000-memory.dmp

    Filesize

    64KB

  • memory/3932-22-0x0000020B4F480000-0x0000020B4F490000-memory.dmp

    Filesize

    64KB

  • memory/3932-23-0x0000020B4F480000-0x0000020B4F490000-memory.dmp

    Filesize

    64KB