Analysis

  • max time kernel
    157s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-03-2024 04:03

General

  • Target

    Abjects.exe

  • Size

    51KB

  • MD5

    ce328046ab3836eef7177159d6e080af

  • SHA1

    596a87e18b4d9789c6fd167ac90036560f4382bc

  • SHA256

    f14535ebeec9ecd43865283cdbdcf4a29548055d64977da1d07255dd8bf00edf

  • SHA512

    27edd18f8f14b63f4ff62ebb0c856590dd7c255fd8d1c025d0ab547761dc7b486b8dc559443ea324ada54019f17e11917fb1712eaa9de53797cb09f61b7db0a2

  • SSDEEP

    768:j06cofrE9MroWR8YcPMeQi/3Go8LqaI6gFS1r2GSZ:Qx/9q9eYLEfGo8OaIqcZ

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Abjects.exe
    "C:\Users\Admin\AppData\Local\Temp\Abjects.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/868-0-0x00000000008B0000-0x00000000008C4000-memory.dmp
    Filesize

    80KB

  • memory/868-1-0x00000000751A0000-0x0000000075950000-memory.dmp
    Filesize

    7.7MB

  • memory/868-2-0x00000000052E0000-0x00000000052F0000-memory.dmp
    Filesize

    64KB

  • memory/868-3-0x0000000005250000-0x00000000052C6000-memory.dmp
    Filesize

    472KB

  • memory/868-4-0x0000000005230000-0x000000000524E000-memory.dmp
    Filesize

    120KB

  • memory/868-5-0x00000000751A0000-0x0000000075950000-memory.dmp
    Filesize

    7.7MB

  • memory/868-6-0x00000000052E0000-0x00000000052F0000-memory.dmp
    Filesize

    64KB