Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2023 22:52

General

  • Target

    1bc919d940d88583f726e3cf425ec2a3.exe

  • Size

    17KB

  • MD5

    1bc919d940d88583f726e3cf425ec2a3

  • SHA1

    321c7e739f9861686813d28c350062ce7f8a763f

  • SHA256

    513d11e94e1524f5d0c8cd126c4ff9ef3864c41a155494ee8b3fb1e71ddb5250

  • SHA512

    80c95b403f71eedd529caab66b5b075846ef9a88a0668b9655503ec760a5ccd64742cc3f51440c5a342b54ad7f4590c165f487689857b3584e60eb2306ab7c0e

  • SSDEEP

    384:P0FAtnQlapx7njALT9oDPlMNcLlb5sVK2yG5Ct:P0FAlQlc7jAXclMNEko

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bc919d940d88583f726e3cf425ec2a3.exe
    "C:\Users\Admin\AppData\Local\Temp\1bc919d940d88583f726e3cf425ec2a3.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3064

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3064-0-0x00007FFA4FB00000-0x00007FFA504A1000-memory.dmp
    Filesize

    9.6MB

  • memory/3064-1-0x000000001C240000-0x000000001C70E000-memory.dmp
    Filesize

    4.8MB

  • memory/3064-3-0x00007FFA4FB00000-0x00007FFA504A1000-memory.dmp
    Filesize

    9.6MB

  • memory/3064-2-0x000000001C7C0000-0x000000001C866000-memory.dmp
    Filesize

    664KB

  • memory/3064-4-0x00000000018A0000-0x00000000018B0000-memory.dmp
    Filesize

    64KB

  • memory/3064-5-0x000000001C950000-0x000000001C9B2000-memory.dmp
    Filesize

    392KB

  • memory/3064-6-0x00007FFA4FB00000-0x00007FFA504A1000-memory.dmp
    Filesize

    9.6MB

  • memory/3064-7-0x00000000018A0000-0x00000000018B0000-memory.dmp
    Filesize

    64KB