Analysis

  • max time kernel
    147s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-02-2024 12:41

General

  • Target

    Tis_Park_Server.exe

  • Size

    8.3MB

  • MD5

    e2c7aec1f1a8bd6b8d3ea8e5cc1cea25

  • SHA1

    6ea85974b9ad72d0efc676e15cfde34c6f5eea03

  • SHA256

    f707dfcbde80c2169bb66358bafc48df63944da07c9f3dd6f64fd3e68133be72

  • SHA512

    42c20602e492670ea32b1416839c7c577211439bf4d239848515fef15b77b8a400abf0be628fd363031f2c3eaa20cd335825cc667b5ce5c9050d7b8f763b2655

  • SSDEEP

    49152:i7Tk/2aLYYGqK340mSy9pppjLN9TeqBTPpQMykMqge8PSIrX0Z91++gKCuAOOv9X:5/NQ5ls9Teel4kMfeiSI0pT59TeU

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Tis_Park_Server.exe
    "C:\Users\Admin\AppData\Local\Temp\Tis_Park_Server.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4452

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4452-0-0x0000000074C80000-0x0000000075430000-memory.dmp

    Filesize

    7.7MB

  • memory/4452-1-0x0000000000E10000-0x0000000001662000-memory.dmp

    Filesize

    8.3MB

  • memory/4452-2-0x0000000006050000-0x00000000060EC000-memory.dmp

    Filesize

    624KB

  • memory/4452-3-0x00000000066A0000-0x0000000006C44000-memory.dmp

    Filesize

    5.6MB

  • memory/4452-4-0x0000000006190000-0x0000000006222000-memory.dmp

    Filesize

    584KB

  • memory/4452-5-0x00000000063A0000-0x00000000063B0000-memory.dmp

    Filesize

    64KB

  • memory/4452-6-0x0000000006120000-0x000000000612A000-memory.dmp

    Filesize

    40KB

  • memory/4452-7-0x00000000063B0000-0x0000000006406000-memory.dmp

    Filesize

    344KB

  • memory/4452-8-0x0000000006C50000-0x0000000006FA4000-memory.dmp

    Filesize

    3.3MB

  • memory/4452-9-0x00000000080F0000-0x0000000008102000-memory.dmp

    Filesize

    72KB

  • memory/4452-10-0x0000000008150000-0x0000000008172000-memory.dmp

    Filesize

    136KB

  • memory/4452-11-0x00000000063A0000-0x00000000063B0000-memory.dmp

    Filesize

    64KB

  • memory/4452-12-0x000000000AB60000-0x000000000ABAC000-memory.dmp

    Filesize

    304KB

  • memory/4452-13-0x000000000ABF0000-0x000000000AC2C000-memory.dmp

    Filesize

    240KB

  • memory/4452-14-0x000000000ABC0000-0x000000000ABE1000-memory.dmp

    Filesize

    132KB

  • memory/4452-15-0x0000000074C80000-0x0000000075430000-memory.dmp

    Filesize

    7.7MB

  • memory/4452-16-0x00000000063A0000-0x00000000063B0000-memory.dmp

    Filesize

    64KB

  • memory/4452-17-0x00000000063A0000-0x00000000063B0000-memory.dmp

    Filesize

    64KB