Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-01-2024 22:48

General

  • Target

    54cb2dce2550f930e72ac6a26fbf93ef.exe

  • Size

    9KB

  • MD5

    54cb2dce2550f930e72ac6a26fbf93ef

  • SHA1

    99683c78503e940699931de41a8e522da7a23ed9

  • SHA256

    81b64178b6c3dddf255911afa43b4d6e54274835c8ec8ca6505622dd6ec1cf7d

  • SHA512

    aa85beece5e6376da321ed2cb64450e1acdce7a20482a374bf0ec74b4707b9c0d1aa8fd5021febede95271252e1e3cf2adaad36d28c4623fd2904f7d8d0bba2d

  • SSDEEP

    192:bBksuDEXVwV1qeMZZ3T93VnjdwCz63MmbuCr+:lVwPqeMdFnhwCuV5

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54cb2dce2550f930e72ac6a26fbf93ef.exe
    "C:\Users\Admin\AppData\Local\Temp\54cb2dce2550f930e72ac6a26fbf93ef.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4984

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4984-0-0x00000000003C0000-0x00000000003C8000-memory.dmp

    Filesize

    32KB

  • memory/4984-1-0x0000000000CA0000-0x0000000000CB2000-memory.dmp

    Filesize

    72KB

  • memory/4984-2-0x00007FFBCA4F0000-0x00007FFBCAFB1000-memory.dmp

    Filesize

    10.8MB

  • memory/4984-3-0x00000000024B0000-0x00000000024EC000-memory.dmp

    Filesize

    240KB

  • memory/4984-4-0x000000001B200000-0x000000001B210000-memory.dmp

    Filesize

    64KB

  • memory/4984-5-0x00007FFBCA4F0000-0x00007FFBCAFB1000-memory.dmp

    Filesize

    10.8MB

  • memory/4984-6-0x00007FFBCA4F0000-0x00007FFBCAFB1000-memory.dmp

    Filesize

    10.8MB