Analysis

  • max time kernel
    93s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/02/2024, 01:31

General

  • Target

    7ddaaf6d21e274d71188c67f0ba01b696283978e07ba00e8321fc2b41a8fa57d.exe

  • Size

    9.8MB

  • MD5

    727bceae00db9d067658146925e96a20

  • SHA1

    7c2eaf38f63aeeaa0a4903cf03fb96dc1c48f7fc

  • SHA256

    7ddaaf6d21e274d71188c67f0ba01b696283978e07ba00e8321fc2b41a8fa57d

  • SHA512

    361ea00095f8ddb921a1a529bed0e9a5cece000492f32a85189b2b5be9c349006d75525bd6e997150834865e48744d4131ac611ec09dc927b793dff017df2709

  • SSDEEP

    196608:mhGS2f3d3reKfTknINTJZn8Wsx8YOBjJounKGg9YzJE3F3arUyEpfWfc:R3dePnOn8WsWYOBuunvzJIarUKk

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ddaaf6d21e274d71188c67f0ba01b696283978e07ba00e8321fc2b41a8fa57d.exe
    "C:\Users\Admin\AppData\Local\Temp\7ddaaf6d21e274d71188c67f0ba01b696283978e07ba00e8321fc2b41a8fa57d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3152

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3152-0-0x00007FFF986A0000-0x00007FFF99161000-memory.dmp

    Filesize

    10.8MB

  • memory/3152-1-0x000001C174100000-0x000001C174AD6000-memory.dmp

    Filesize

    9.8MB

  • memory/3152-2-0x000001C176630000-0x000001C176676000-memory.dmp

    Filesize

    280KB

  • memory/3152-3-0x000001C176770000-0x000001C176780000-memory.dmp

    Filesize

    64KB

  • memory/3152-7-0x000001C176790000-0x000001C176798000-memory.dmp

    Filesize

    32KB

  • memory/3152-6-0x000001C176780000-0x000001C17678A000-memory.dmp

    Filesize

    40KB

  • memory/3152-5-0x000001C1766D0000-0x000001C1766DC000-memory.dmp

    Filesize

    48KB

  • memory/3152-4-0x000001C1766C0000-0x000001C1766C8000-memory.dmp

    Filesize

    32KB

  • memory/3152-8-0x000001C1788D0000-0x000001C178ACE000-memory.dmp

    Filesize

    2.0MB

  • memory/3152-9-0x000001C1766E0000-0x000001C1766EE000-memory.dmp

    Filesize

    56KB

  • memory/3152-10-0x000001C1767B0000-0x000001C1767B8000-memory.dmp

    Filesize

    32KB

  • memory/3152-14-0x000001C178D50000-0x000001C178D58000-memory.dmp

    Filesize

    32KB

  • memory/3152-15-0x000001C178D60000-0x000001C178D68000-memory.dmp

    Filesize

    32KB

  • memory/3152-16-0x000001C178D70000-0x000001C178D78000-memory.dmp

    Filesize

    32KB

  • memory/3152-17-0x000001C178D80000-0x000001C178D88000-memory.dmp

    Filesize

    32KB

  • memory/3152-18-0x000001C178D90000-0x000001C178D98000-memory.dmp

    Filesize

    32KB

  • memory/3152-19-0x000001C178DA0000-0x000001C178DA8000-memory.dmp

    Filesize

    32KB

  • memory/3152-20-0x000001C178DB0000-0x000001C178DC8000-memory.dmp

    Filesize

    96KB

  • memory/3152-21-0x000001C178D40000-0x000001C178D4A000-memory.dmp

    Filesize

    40KB

  • memory/3152-22-0x000001C178DD0000-0x000001C178E1C000-memory.dmp

    Filesize

    304KB

  • memory/3152-23-0x000001C178E20000-0x000001C178E28000-memory.dmp

    Filesize

    32KB

  • memory/3152-24-0x000001C178F70000-0x000001C179022000-memory.dmp

    Filesize

    712KB

  • memory/3152-25-0x000001C179190000-0x000001C179198000-memory.dmp

    Filesize

    32KB

  • memory/3152-26-0x000001C17D360000-0x000001C17D398000-memory.dmp

    Filesize

    224KB

  • memory/3152-27-0x000001C179350000-0x000001C17935E000-memory.dmp

    Filesize

    56KB

  • memory/3152-28-0x00007FFF986A0000-0x00007FFF99161000-memory.dmp

    Filesize

    10.8MB

  • memory/3152-29-0x000001C176770000-0x000001C176780000-memory.dmp

    Filesize

    64KB