Analysis

  • max time kernel
    150s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2023 20:19

General

  • Target

    da18f76629df98da6c859fdda178f411ff3f05b326416a0994ae676cfd658e41.exe

  • Size

    1.9MB

  • MD5

    0c0a619fe74916c19c8db8cb94b63c35

  • SHA1

    eee29377b3baeb61ab963d34d166f69d04ace3ec

  • SHA256

    da18f76629df98da6c859fdda178f411ff3f05b326416a0994ae676cfd658e41

  • SHA512

    4a119c63118f01f77d411147b675ff9c4d367a485ee5c8d6d72c963c2f60a9c16041722d08c21ca87e90271cb8ae8ac869b1c11c23637ce60bd1b7cce1c15e50

  • SSDEEP

    49152:TmJeoncYOmlmJRGPlJeAp/nyxXT5XtzQx4I1:QmJMPl4D59z9I1

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da18f76629df98da6c859fdda178f411ff3f05b326416a0994ae676cfd658e41.exe
    "C:\Users\Admin\AppData\Local\Temp\da18f76629df98da6c859fdda178f411ff3f05b326416a0994ae676cfd658e41.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1896

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1896-0-0x000001E3BAA20000-0x000001E3BAA54000-memory.dmp

    Filesize

    208KB

  • memory/1896-1-0x00007FFDAEF30000-0x00007FFDAF9F1000-memory.dmp

    Filesize

    10.8MB

  • memory/1896-2-0x000001E3BB030000-0x000001E3BB040000-memory.dmp

    Filesize

    64KB

  • memory/1896-3-0x000001E3BB030000-0x000001E3BB040000-memory.dmp

    Filesize

    64KB

  • memory/1896-4-0x000001E3BB030000-0x000001E3BB040000-memory.dmp

    Filesize

    64KB

  • memory/1896-5-0x000001E3D8770000-0x000001E3D8778000-memory.dmp

    Filesize

    32KB

  • memory/1896-6-0x000001E3D8E00000-0x000001E3D8E38000-memory.dmp

    Filesize

    224KB

  • memory/1896-7-0x000001E3D8790000-0x000001E3D879E000-memory.dmp

    Filesize

    56KB

  • memory/1896-12-0x00007FFDAEF30000-0x00007FFDAF9F1000-memory.dmp

    Filesize

    10.8MB

  • memory/1896-13-0x000001E3BB030000-0x000001E3BB040000-memory.dmp

    Filesize

    64KB

  • memory/1896-14-0x000001E3BB030000-0x000001E3BB040000-memory.dmp

    Filesize

    64KB

  • memory/1896-15-0x000001E3BB030000-0x000001E3BB040000-memory.dmp

    Filesize

    64KB

  • memory/1896-16-0x000001E3BB030000-0x000001E3BB040000-memory.dmp

    Filesize

    64KB