Analysis

  • max time kernel
    139s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 15:42

General

  • Target

    2a2ac5eb659f165cbe92713e4d5282a8.exe

  • Size

    35KB

  • MD5

    2a2ac5eb659f165cbe92713e4d5282a8

  • SHA1

    a57a710abb3dd27084be4db71e18e84e95e84319

  • SHA256

    8cee0aa437d36444bd4867ccc7457a1d0b95161c847ca25d1e3181196bcf7329

  • SHA512

    0cfe14594702b046e2022a174f9920c9722822bd219f1c355380b67c8181db7b1da3832190a4f912767e2a642b2ff894875d476e97ac1f9866538fa7a25e1fb1

  • SSDEEP

    384:wFwNNtTeGZxvi2JS/RTNedKFwNoK1j/HjVYYhX1r7vSNnJtp+bMkIWNHWR9+EMQY:Qwvt6Qg/Ry+wVjLKsX1vqbYY4Y9l2D

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a2ac5eb659f165cbe92713e4d5282a8.exe
    "C:\Users\Admin\AppData\Local\Temp\2a2ac5eb659f165cbe92713e4d5282a8.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4616

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4616-0-0x0000000002170000-0x0000000002172000-memory.dmp

          Filesize

          8KB

        • memory/4616-1-0x0000000002170000-0x0000000002172000-memory.dmp

          Filesize

          8KB