Analysis

  • max time kernel
    119s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 06:34

General

  • Target

    2bdcc23a5f2db856d0e107ee94db01ff.exe

  • Size

    289KB

  • MD5

    2bdcc23a5f2db856d0e107ee94db01ff

  • SHA1

    0ebe4db2495a29853477a4df9a644fe83281598a

  • SHA256

    10bcbb156580b225516739a09eb4f13ed64941b23012b64684038b460ad29d4b

  • SHA512

    8938e534e43b61f2266e2d6e57b72f1d4e257e4bca587f5dfa7079ca85c7a51a5f5ec959d0b29264e7542fc9c183a5cc1e5a455d155502761bce4cbe4107c5d1

  • SSDEEP

    6144:VUi0aRHUY1vjapGWCNp/G2H+tv0TBZvsKuJN:qi0aRHUAjapGWCNp/G2H+tv0TPpuJN

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bdcc23a5f2db856d0e107ee94db01ff.exe
    "C:\Users\Admin\AppData\Local\Temp\2bdcc23a5f2db856d0e107ee94db01ff.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4500

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads