Analysis

  • max time kernel
    564s
  • max time network
    566s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2024 14:39

General

  • Target

    a4704be3a77f989693188a4a505b62719ffe87718f8891ab5d3e1de1b1a57572.exe

  • Size

    565KB

  • MD5

    587163ebb29d37762be9b65b4553733a

  • SHA1

    1688aadda5db2d63fdd296edd65a8063db1a3eec

  • SHA256

    a4704be3a77f989693188a4a505b62719ffe87718f8891ab5d3e1de1b1a57572

  • SHA512

    3222f727beb7e8b5d512355863bd0d280b7a6303a1a770345e9d48b48b4c8d37f10a78085ad1d82db265c3a97c2651856366975403aa8656c0127961208b589b

  • SSDEEP

    6144:vQfvuXwa/F2wHHG/BY1oDShdi6QgEOr26QD3T:OmX37H7hA6P26Mj

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4704be3a77f989693188a4a505b62719ffe87718f8891ab5d3e1de1b1a57572.exe
    "C:\Users\Admin\AppData\Local\Temp\a4704be3a77f989693188a4a505b62719ffe87718f8891ab5d3e1de1b1a57572.exe"
    1⤵
      PID:1460
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4608
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4388

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1460-0-0x000000001BEA0000-0x000000001BF46000-memory.dmp

        Filesize

        664KB

      • memory/1460-1-0x00007FF938800000-0x00007FF9391A1000-memory.dmp

        Filesize

        9.6MB

      • memory/1460-2-0x000000001C4B0000-0x000000001C97E000-memory.dmp

        Filesize

        4.8MB

      • memory/1460-4-0x0000000001820000-0x0000000001830000-memory.dmp

        Filesize

        64KB

      • memory/1460-5-0x000000001CA20000-0x000000001CABC000-memory.dmp

        Filesize

        624KB

      • memory/1460-6-0x00000000018B0000-0x00000000018B8000-memory.dmp

        Filesize

        32KB

      • memory/1460-7-0x000000001CBB0000-0x000000001CBFC000-memory.dmp

        Filesize

        304KB

      • memory/1460-3-0x00007FF938800000-0x00007FF9391A1000-memory.dmp

        Filesize

        9.6MB

      • memory/1460-10-0x0000000001820000-0x0000000001830000-memory.dmp

        Filesize

        64KB

      • memory/1460-9-0x0000000001820000-0x0000000001830000-memory.dmp

        Filesize

        64KB

      • memory/1460-8-0x0000000001820000-0x0000000001830000-memory.dmp

        Filesize

        64KB

      • memory/1460-11-0x00007FF938800000-0x00007FF9391A1000-memory.dmp

        Filesize

        9.6MB

      • memory/1460-12-0x0000000001820000-0x0000000001830000-memory.dmp

        Filesize

        64KB

      • memory/1460-14-0x0000000001820000-0x0000000001830000-memory.dmp

        Filesize

        64KB

      • memory/1460-13-0x0000000001820000-0x0000000001830000-memory.dmp

        Filesize

        64KB

      • memory/1460-15-0x0000000001820000-0x0000000001830000-memory.dmp

        Filesize

        64KB

      • memory/4388-48-0x000001FA55570000-0x000001FA55571000-memory.dmp

        Filesize

        4KB

      • memory/4388-52-0x000001FA556B0000-0x000001FA556B1000-memory.dmp

        Filesize

        4KB

      • memory/4388-51-0x000001FA555A0000-0x000001FA555A1000-memory.dmp

        Filesize

        4KB

      • memory/4388-50-0x000001FA555A0000-0x000001FA555A1000-memory.dmp

        Filesize

        4KB

      • memory/4388-32-0x000001FA4D240000-0x000001FA4D250000-memory.dmp

        Filesize

        64KB