Analysis

  • max time kernel
    126s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/12/2023, 19:19

General

  • Target

    3ad82d773f80bff67560c67fddb2202f.exe

  • Size

    127KB

  • MD5

    3ad82d773f80bff67560c67fddb2202f

  • SHA1

    e773666f0d36ad6a36f1e2717d223fb40cd9bcd1

  • SHA256

    c64a33bfc905f460d22f23a0b9344a07fe80b7bb1190b1ccc9e021bccd7f81aa

  • SHA512

    8b4e1a10cceb2f9577868109906a5c39628f4a0745162f2ef9a9890dcf96deadc3f750d2c237072bf56ec5122c225833e1c18c2a0e96caa9f8ec0678d0fb3fda

  • SSDEEP

    384:pMnaM+LS6mkxnrb0N6FM5YQAjAimJZN8qIqzrEL3r+:pRS6mOfyJ5Y6imJZNTobr+

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ad82d773f80bff67560c67fddb2202f.exe
    "C:\Users\Admin\AppData\Local\Temp\3ad82d773f80bff67560c67fddb2202f.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2044

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads