Analysis

  • max time kernel
    152s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-01-2024 14:20

General

  • Target

    075F9A8B9A5A3F3C221CFA69BA8B3590CFB873946970B7F3DBD333A580D24AC5.exe

  • Size

    190KB

  • MD5

    a3a2816c2a4e8c7374c0d973a0fc4c8e

  • SHA1

    ead016fe4e5d9bc24cc186e8fec28c9b07606966

  • SHA256

    075f9a8b9a5a3f3c221cfa69ba8b3590cfb873946970b7f3dbd333a580d24ac5

  • SHA512

    b9eb4bfbf8dd4320fffd98e92d46e55882544f4fda5cfd5586e48b4da4fd919bf575afa0443732c88be5aaed2fff756342d4c33b0bcceb4474bee69af0d9d3ab

  • SSDEEP

    3072:aVOMzfEpDHKNBW6Q/THGVp3DqGxgkjCXLCz0fugKkqEjBD:a4M4FMgXCTTdL0fuLfe

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\075F9A8B9A5A3F3C221CFA69BA8B3590CFB873946970B7F3DBD333A580D24AC5.exe
    "C:\Users\Admin\AppData\Local\Temp\075F9A8B9A5A3F3C221CFA69BA8B3590CFB873946970B7F3DBD333A580D24AC5.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4536

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads