Analysis

  • max time kernel
    143s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 06:02

General

  • Target

    109856f46fd0d75ac0551b696c738e22.exe

  • Size

    211KB

  • MD5

    109856f46fd0d75ac0551b696c738e22

  • SHA1

    0af1a5d79ad0d71c106434ebf96d9ac997408179

  • SHA256

    414db7ca9396e8ade0b09f11a051098295b6247a4fa9893e08985881069b58ab

  • SHA512

    2264890f382233093186a35fbac44bb261619d393ad2c5d26d045b1c0a5023d1889b10a9b50365379ffaff83aa13349b5b6205a421d1cc326def5a04ca611a47

  • SSDEEP

    6144:goL9izSBmrggZxv49h7modKUFY/qcaY4KWs522/lclPHsaZc5i7nSngy9vImwQ:Gr9Zgiodo/WKW32/lclPei7nSngy9vIa

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\109856f46fd0d75ac0551b696c738e22.exe
    "C:\Users\Admin\AppData\Local\Temp\109856f46fd0d75ac0551b696c738e22.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1348

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1348-0-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1348-1-0x0000000000510000-0x0000000000546000-memory.dmp

    Filesize

    216KB

  • memory/1348-2-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1348-3-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1348-4-0x0000000000510000-0x0000000000546000-memory.dmp

    Filesize

    216KB