Analysis

  • max time kernel
    206s
  • max time network
    223s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2024 04:31

General

  • Target

    42eac65542918c92a392844226f9d2c8257340935522511562fe53f059b865d2.exe

  • Size

    1.6MB

  • MD5

    dfd2df601a31fc8b08812e91067b8796

  • SHA1

    837a846f9210c4dd5c79648170a3a1c8dce10a46

  • SHA256

    42eac65542918c92a392844226f9d2c8257340935522511562fe53f059b865d2

  • SHA512

    e20c31bcc09c3eed8b190480f15ec9763d511f37da8b43ba82383a397210bb8c02cb7a7329310b7dc6a34e5fc298a47f3953403f476877c96573dcdffdedba18

  • SSDEEP

    12288:Nj9B+VKUMAdB8qr0zw9iXQ40AOzDr5YJjsF/5v3ZkHRik8:Nj9BBatr0zAiX90z/F0jsFB3SQk

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42eac65542918c92a392844226f9d2c8257340935522511562fe53f059b865d2.exe
    "C:\Users\Admin\AppData\Local\Temp\42eac65542918c92a392844226f9d2c8257340935522511562fe53f059b865d2.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/968-0-0x0000000000400000-0x0000000000595000-memory.dmp

    Filesize

    1.6MB

  • memory/968-1-0x0000000000B50000-0x0000000000BB7000-memory.dmp

    Filesize

    412KB

  • memory/968-7-0x0000000000B50000-0x0000000000BB7000-memory.dmp

    Filesize

    412KB

  • memory/968-11-0x0000000000400000-0x0000000000595000-memory.dmp

    Filesize

    1.6MB