Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 04:57

General

  • Target

    b690cd49752ce4b77717c238682fc14c.exe

  • Size

    9KB

  • MD5

    b690cd49752ce4b77717c238682fc14c

  • SHA1

    d4d9cd77650c9098d29f77fb16103e8538250e3c

  • SHA256

    f73adcc11842bd5ef761533db675431050b91217c961e43279294f0d44a898f8

  • SHA512

    98f32cd9deed532c3980ebca4444b4ba2e7fd6a02131891f49dad9750965f25e8d2384c46b0b46935c3dc7dc24bc55805ef2aef1dc6810a180dc6cd13c11eb7a

  • SSDEEP

    192:dBksuXzHNQIReMZZ3393VnjdwqzT3tKgCkmla:2HHReMRFnhwq/dRCkml

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b690cd49752ce4b77717c238682fc14c.exe
    "C:\Users\Admin\AppData\Local\Temp\b690cd49752ce4b77717c238682fc14c.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2240

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2240-0-0x00000000006D0000-0x00000000006D8000-memory.dmp

          Filesize

          32KB

        • memory/2240-1-0x0000000002750000-0x0000000002762000-memory.dmp

          Filesize

          72KB

        • memory/2240-2-0x00000000027C0000-0x00000000027FC000-memory.dmp

          Filesize

          240KB

        • memory/2240-3-0x00007FF9B29A0000-0x00007FF9B3461000-memory.dmp

          Filesize

          10.8MB

        • memory/2240-4-0x0000000002850000-0x0000000002860000-memory.dmp

          Filesize

          64KB

        • memory/2240-5-0x00007FF9B29A0000-0x00007FF9B3461000-memory.dmp

          Filesize

          10.8MB

        • memory/2240-6-0x00007FF9B29A0000-0x00007FF9B3461000-memory.dmp

          Filesize

          10.8MB