Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 12:02

General

  • Target

    c08cf1b63c9203aa2af4ac81ce4721c4.exe

  • Size

    9KB

  • MD5

    c08cf1b63c9203aa2af4ac81ce4721c4

  • SHA1

    6c12eb9e7ee1863283a8ec51c83ad7c15bc7f9fa

  • SHA256

    732d60ebebeaf020000473dd9465f1de9026c3886528e5c1ec536e49db777a0e

  • SHA512

    090ec715b448cbcfa957b468438c8b8747261103749a3cfa4df302a4fee261206370fca51500deaeb67178eedbef2042aad9070f0fff0e1a41f16685e3dfd5c5

  • SSDEEP

    192:GBksuzPY82gQv5F4itteMZZ3+93VnjdwCzWh3hEQ:e82l4itteMyFnhwCKhxE

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c08cf1b63c9203aa2af4ac81ce4721c4.exe
    "C:\Users\Admin\AppData\Local\Temp\c08cf1b63c9203aa2af4ac81ce4721c4.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2792

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2792-0-0x0000000000600000-0x0000000000608000-memory.dmp

          Filesize

          32KB

        • memory/2792-1-0x000000001B090000-0x000000001B0A2000-memory.dmp

          Filesize

          72KB

        • memory/2792-3-0x00007FFA32060000-0x00007FFA32B21000-memory.dmp

          Filesize

          10.8MB

        • memory/2792-2-0x000000001B0F0000-0x000000001B12C000-memory.dmp

          Filesize

          240KB

        • memory/2792-4-0x000000001B3C0000-0x000000001B3D0000-memory.dmp

          Filesize

          64KB

        • memory/2792-5-0x00007FFA32060000-0x00007FFA32B21000-memory.dmp

          Filesize

          10.8MB

        • memory/2792-6-0x00007FFA32060000-0x00007FFA32B21000-memory.dmp

          Filesize

          10.8MB