Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/01/2024, 04:14

General

  • Target

    793fa559277e04e8dd61880d56a651b5.exe

  • Size

    26KB

  • MD5

    793fa559277e04e8dd61880d56a651b5

  • SHA1

    79e666a7f0dc953757231a1f367545423ec631d4

  • SHA256

    a2f9e6b36458e57f668dfc259fa14568902568ef8d1f861293333fb7991b537e

  • SHA512

    63a322a54925e37a5289953be758d99c8fb7de2ce320aa50a8a8a8c65372cd0f1161c05b95ac096e0f1e07f01239af682b579e2e12102b57b48b4faf73ef165f

  • SSDEEP

    768:3++JJxWSiVei0KhNN7hPmKiuLZjAUxDghRX:O+JJxWfVei0ah+bYykDox

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\793fa559277e04e8dd61880d56a651b5.exe
    "C:\Users\Admin\AppData\Local\Temp\793fa559277e04e8dd61880d56a651b5.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3952-0-0x00000000000E0000-0x00000000000EC000-memory.dmp

    Filesize

    48KB

  • memory/3952-1-0x00007FF95D140000-0x00007FF95DC01000-memory.dmp

    Filesize

    10.8MB

  • memory/3952-2-0x0000000000890000-0x00000000008A0000-memory.dmp

    Filesize

    64KB

  • memory/3952-4-0x00007FF95D140000-0x00007FF95DC01000-memory.dmp

    Filesize

    10.8MB