Analysis

  • max time kernel
    140s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2023 06:16

General

  • Target

    74ea87634c37a1e6b9e90e80b4082e48.exe

  • Size

    9KB

  • MD5

    74ea87634c37a1e6b9e90e80b4082e48

  • SHA1

    b76d24e1d29151635b42ca3c6af666f894807a65

  • SHA256

    a26a1e106baf5efaf850352e932e69a5f2921921cc4fd7ffb81804cc78de8ae0

  • SHA512

    c718f18a0111b99406dd5ac19e748bba59161c41b0e02b15b27b0951f258ac7b71a6e8b24541bb84d220a7224c866c933d42abf3d4ee7e96c34e79038527272d

  • SSDEEP

    192:HBksun9MuIXYeMZZ3m93Vnjdwqzu3L9sCQSX:clqYeMSFnhwqyb9sCR

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74ea87634c37a1e6b9e90e80b4082e48.exe
    "C:\Users\Admin\AppData\Local\Temp\74ea87634c37a1e6b9e90e80b4082e48.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2244

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2244-0-0x0000000000A40000-0x0000000000A48000-memory.dmp

    Filesize

    32KB

  • memory/2244-1-0x0000000002BD0000-0x0000000002BE2000-memory.dmp

    Filesize

    72KB

  • memory/2244-2-0x0000000002C30000-0x0000000002C6C000-memory.dmp

    Filesize

    240KB

  • memory/2244-3-0x00007FFDEF460000-0x00007FFDEFF21000-memory.dmp

    Filesize

    10.8MB

  • memory/2244-4-0x000000001B8A0000-0x000000001B8B0000-memory.dmp

    Filesize

    64KB

  • memory/2244-5-0x00007FFDEF460000-0x00007FFDEFF21000-memory.dmp

    Filesize

    10.8MB

  • memory/2244-6-0x000000001B8A0000-0x000000001B8B0000-memory.dmp

    Filesize

    64KB

  • memory/2244-7-0x00007FFDEF460000-0x00007FFDEFF21000-memory.dmp

    Filesize

    10.8MB