Analysis

  • max time kernel
    143s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-01-2024 17:17

General

  • Target

    77ef37ffbe5a9ee6aa331e2a7399e4bc.exe

  • Size

    8KB

  • MD5

    77ef37ffbe5a9ee6aa331e2a7399e4bc

  • SHA1

    9665d42258439d42fc7e2cf1a2a582176adc40ba

  • SHA256

    13467ddf9403170cfc779d2f1b61a4aaf6d2020845b526e5f94a895c5b52b8ad

  • SHA512

    094de969775651ca463b502c2accb19ffa30ccc82b2a002c9b45147baa02f0419d01111a3953a6f3d1edd9ac6a700c33100f0028b51abb64d0b86ff4a324bce1

  • SSDEEP

    192:rs72kKiHZl1tQ8x2Dx40ieGDXuT6R+IseYVt+WzqWOrotv+wCq4UmoeakgUwu:A72aHJttGi4M+gsBzxCot2woUtW

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3460
      • C:\Users\Admin\AppData\Local\Temp\77ef37ffbe5a9ee6aa331e2a7399e4bc.exe
        "C:\Users\Admin\AppData\Local\Temp\77ef37ffbe5a9ee6aa331e2a7399e4bc.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2176

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2176-0-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/2176-1-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB