Analysis

  • max time kernel
    139s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-02-2024 11:22

General

  • Target

    8f06914f14dcd2fef658833b4d7cb6fb.exe

  • Size

    9KB

  • MD5

    8f06914f14dcd2fef658833b4d7cb6fb

  • SHA1

    3d28ec196d812c04a5cd6446a77a8951f2a3524c

  • SHA256

    4a698d5487fa0d2c5913c1d33e0c4a14d4c158c532c7413599bd6057de9f70ca

  • SHA512

    4ea4ac7c43b1ce221d507d3a44627e0ae032869c325c385cd58e587579d6abb06ed086447950c36a024d7cde5001b59d49d23da2dbc085d19c8f75266d4cec03

  • SSDEEP

    192:yBksu/rN3y+dFeMZZ3M93VnjdwCzS3ccAoF4E:NZPFeMAFnhwCOMho

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f06914f14dcd2fef658833b4d7cb6fb.exe
    "C:\Users\Admin\AppData\Local\Temp\8f06914f14dcd2fef658833b4d7cb6fb.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/952-0-0x00000000005D0000-0x00000000005D8000-memory.dmp

    Filesize

    32KB

  • memory/952-1-0x00007FFBE7850000-0x00007FFBE8311000-memory.dmp

    Filesize

    10.8MB

  • memory/952-2-0x0000000000EA0000-0x0000000000EB2000-memory.dmp

    Filesize

    72KB

  • memory/952-3-0x0000000000F00000-0x0000000000F3C000-memory.dmp

    Filesize

    240KB

  • memory/952-4-0x000000001B4F0000-0x000000001B500000-memory.dmp

    Filesize

    64KB

  • memory/952-5-0x00007FFBE7850000-0x00007FFBE8311000-memory.dmp

    Filesize

    10.8MB

  • memory/952-6-0x000000001B4F0000-0x000000001B500000-memory.dmp

    Filesize

    64KB

  • memory/952-7-0x00007FFBE7850000-0x00007FFBE8311000-memory.dmp

    Filesize

    10.8MB