Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-03-2024 02:24

General

  • Target

    203fc2275995bc373719783696b0fe7b76ce57589f75819ce9f93b92363e4329.exe

  • Size

    1.7MB

  • MD5

    a88aef05330643d069fd7698bb7dfb42

  • SHA1

    60f0bdd783d1728358bb7d08e583761a3551209c

  • SHA256

    203fc2275995bc373719783696b0fe7b76ce57589f75819ce9f93b92363e4329

  • SHA512

    cd0552278ca2a7397bca1b926ae456d347c946d76229bf29d1149fba1e53fb5f3f75da5c2121cd8b8668963f811b483820da9f86d456b6c93e04f03962844aaa

  • SSDEEP

    24576:SdmdHw6eRydJzGdVfhkvBXpAIL6xyppXFX2IvL2IvLvqwAQngOYpXF:Swd4fhkfaQn

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\203fc2275995bc373719783696b0fe7b76ce57589f75819ce9f93b92363e4329.exe
    "C:\Users\Admin\AppData\Local\Temp\203fc2275995bc373719783696b0fe7b76ce57589f75819ce9f93b92363e4329.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1612-0-0x000002A100530000-0x000002A1006EE000-memory.dmp

    Filesize

    1.7MB

  • memory/1612-1-0x00007FFCD5E30000-0x00007FFCD68F1000-memory.dmp

    Filesize

    10.8MB

  • memory/1612-2-0x000002A11AF60000-0x000002A11AF70000-memory.dmp

    Filesize

    64KB

  • memory/1612-3-0x00007FFCD5E30000-0x00007FFCD68F1000-memory.dmp

    Filesize

    10.8MB