Analysis

  • max time kernel
    134s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/01/2024, 23:26

General

  • Target

    CONECTAR MANDO PS3/CABLE/DSHMC.exe

  • Size

    3.4MB

  • MD5

    a8fac715901cfa315425fe12876b5814

  • SHA1

    a45f1891cda4b61807d1d682e285b92686bf2742

  • SHA256

    10e03a6fd23c96790a89d2001b323f77d8efb46290948d984fb325b58bc88cc5

  • SHA512

    f219389183e1321da35c5b7e86a6e860716abdf95e876bee8d4b346c8ed4f72af60c270c7e2d6dc02a3afa805b39f05d4156d79d6f01bc1dc73b806783fb4a9e

  • SSDEEP

    49152:8BlhzjSixb+YKwpiDeAjDHDO8uqVnDk+zxsIRzyfnTJbStH8PAFUc7B:87hzjSi8YH4L/jDDk+lm08YFUcN

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CONECTAR MANDO PS3\CABLE\DSHMC.exe
    "C:\Users\Admin\AppData\Local\Temp\CONECTAR MANDO PS3\CABLE\DSHMC.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2760-0-0x00000000004D0000-0x0000000000838000-memory.dmp

    Filesize

    3.4MB

  • memory/2760-1-0x00000000748A0000-0x0000000075050000-memory.dmp

    Filesize

    7.7MB

  • memory/2760-2-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

    Filesize

    64KB

  • memory/2760-3-0x00000000051B0000-0x00000000051E0000-memory.dmp

    Filesize

    192KB

  • memory/2760-4-0x00000000051E0000-0x000000000522E000-memory.dmp

    Filesize

    312KB

  • memory/2760-5-0x0000000005440000-0x00000000054FA000-memory.dmp

    Filesize

    744KB

  • memory/2760-7-0x00000000053B0000-0x00000000053BE000-memory.dmp

    Filesize

    56KB

  • memory/2760-6-0x0000000005390000-0x00000000053B6000-memory.dmp

    Filesize

    152KB

  • memory/2760-8-0x0000000005600000-0x00000000056B0000-memory.dmp

    Filesize

    704KB

  • memory/2760-9-0x00000000056E0000-0x0000000005702000-memory.dmp

    Filesize

    136KB

  • memory/2760-10-0x0000000005710000-0x0000000005A64000-memory.dmp

    Filesize

    3.3MB

  • memory/2760-11-0x0000000005B50000-0x0000000005BE2000-memory.dmp

    Filesize

    584KB

  • memory/2760-12-0x0000000005FC0000-0x0000000005FFE000-memory.dmp

    Filesize

    248KB

  • memory/2760-13-0x00000000060D0000-0x00000000061F8000-memory.dmp

    Filesize

    1.2MB

  • memory/2760-14-0x0000000006200000-0x000000000656A000-memory.dmp

    Filesize

    3.4MB

  • memory/2760-15-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

    Filesize

    64KB

  • memory/2760-16-0x00000000095A0000-0x00000000095A8000-memory.dmp

    Filesize

    32KB

  • memory/2760-18-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

    Filesize

    64KB

  • memory/2760-17-0x00000000095C0000-0x00000000095C8000-memory.dmp

    Filesize

    32KB

  • memory/2760-20-0x0000000009700000-0x000000000970E000-memory.dmp

    Filesize

    56KB

  • memory/2760-19-0x0000000009720000-0x0000000009758000-memory.dmp

    Filesize

    224KB

  • memory/2760-22-0x0000000009EC0000-0x0000000009EE0000-memory.dmp

    Filesize

    128KB

  • memory/2760-21-0x0000000009E60000-0x0000000009EA6000-memory.dmp

    Filesize

    280KB

  • memory/2760-23-0x00000000748A0000-0x0000000075050000-memory.dmp

    Filesize

    7.7MB

  • memory/2760-24-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

    Filesize

    64KB

  • memory/2760-25-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

    Filesize

    64KB

  • memory/2760-26-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

    Filesize

    64KB