Analysis

  • max time kernel
    92s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2024 09:54

General

  • Target

    8eda007bfa0306efb2e89fa462c2dff2.exe

  • Size

    9KB

  • MD5

    8eda007bfa0306efb2e89fa462c2dff2

  • SHA1

    996e69d3c45ddc0903180f7025ccd694094c4c09

  • SHA256

    e575269e120674aae3ac1bd6b5bb68626d01f71163837cbe8e79dee883e3f97c

  • SHA512

    45981ef1fe596d23b7c7bb3972ece72ce91e2a8925f64da3555078bfccb7305e4fe69c795abc2ccf11342aaeb2d26394fcf269b0a9f310c58f64e703533f8ad9

  • SSDEEP

    192:kBksuXrN3y+BheMZZ3g93VnjdwCzH3t9/KKyHQ:LZfheM0FnhwCzrAH

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8eda007bfa0306efb2e89fa462c2dff2.exe
    "C:\Users\Admin\AppData\Local\Temp\8eda007bfa0306efb2e89fa462c2dff2.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4324

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4324-0-0x00000000002F0000-0x00000000002F8000-memory.dmp

    Filesize

    32KB

  • memory/4324-1-0x00000000024A0000-0x00000000024B2000-memory.dmp

    Filesize

    72KB

  • memory/4324-3-0x00007FFA76D40000-0x00007FFA77801000-memory.dmp

    Filesize

    10.8MB

  • memory/4324-4-0x000000001B110000-0x000000001B120000-memory.dmp

    Filesize

    64KB

  • memory/4324-2-0x000000001ADF0000-0x000000001AE2C000-memory.dmp

    Filesize

    240KB

  • memory/4324-5-0x00007FFA76D40000-0x00007FFA77801000-memory.dmp

    Filesize

    10.8MB

  • memory/4324-6-0x00007FFA76D40000-0x00007FFA77801000-memory.dmp

    Filesize

    10.8MB