Analysis

  • max time kernel
    146s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2023 22:01

General

  • Target

    050e0d55988cdec3fea965c0e2f4f0cd.exe

  • Size

    9KB

  • MD5

    050e0d55988cdec3fea965c0e2f4f0cd

  • SHA1

    1049d4301e9e9c875f832df06405e8e4c08a98f2

  • SHA256

    74c5f2ccbba754b0d6a5231e4f6bcbe992da25d4c9539adf502da5f09ae464f3

  • SHA512

    89df700ee3a05f9c062659fd01c710aed1aee6d33a0289a5af6f3146de9a94452a9541d2aaec84407c3ed16e4a3f67f7db0895eeac2788e3d2d495df71caf78b

  • SSDEEP

    192:1BksuXm6N7oy19ueMZZ3893Vnjdwqz8r3E0R71gr:N4x7ueMIFnhwqQrU+G

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\050e0d55988cdec3fea965c0e2f4f0cd.exe
    "C:\Users\Admin\AppData\Local\Temp\050e0d55988cdec3fea965c0e2f4f0cd.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2364-0-0x0000000000990000-0x0000000000998000-memory.dmp

    Filesize

    32KB

  • memory/2364-2-0x00007FFD73900000-0x00007FFD743C1000-memory.dmp

    Filesize

    10.8MB

  • memory/2364-1-0x0000000001260000-0x0000000001272000-memory.dmp

    Filesize

    72KB

  • memory/2364-3-0x0000000001340000-0x000000000137C000-memory.dmp

    Filesize

    240KB

  • memory/2364-4-0x0000000001290000-0x00000000012A0000-memory.dmp

    Filesize

    64KB

  • memory/2364-5-0x00007FFD73900000-0x00007FFD743C1000-memory.dmp

    Filesize

    10.8MB

  • memory/2364-6-0x0000000001290000-0x00000000012A0000-memory.dmp

    Filesize

    64KB

  • memory/2364-7-0x00007FFD73900000-0x00007FFD743C1000-memory.dmp

    Filesize

    10.8MB