Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/03/2024, 13:44

General

  • Target

    de257e8c9e2b777b2b4fab4f192f4443.exe

  • Size

    102KB

  • MD5

    de257e8c9e2b777b2b4fab4f192f4443

  • SHA1

    03c0ff3d5e00c44b3a1f616774c5dae3da231b7a

  • SHA256

    e42db9b62e21d48ee8b1508fa8d97c5c33425d4aba19af5c4d89592322a21b96

  • SHA512

    4556fdd028b42f5a6cc13b6e7caad866bffe00dad2ba14f0ca8db023de79400cb36492b33715f13d37722bf27a381a4b72ddf60dc3c1d1c45e44224c78e9d772

  • SSDEEP

    3072:2fMB9BlVB0E6VnkZup4WUYnY8exTDyylOsxq:2KBl4EpupQxbTDyKOsM

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de257e8c9e2b777b2b4fab4f192f4443.exe
    "C:\Users\Admin\AppData\Local\Temp\de257e8c9e2b777b2b4fab4f192f4443.exe"
    1⤵
      PID:1484
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x320 0x31c
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2256

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1484-0-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-1-0x00000000001D0000-0x00000000001D2000-memory.dmp

      Filesize

      8KB

    • memory/1484-2-0x00000000001E0000-0x00000000001E1000-memory.dmp

      Filesize

      4KB

    • memory/1484-3-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-4-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-5-0x00000000001D0000-0x00000000001D2000-memory.dmp

      Filesize

      8KB

    • memory/1484-6-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-7-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-8-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-9-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-10-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-11-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-12-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-13-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-14-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-15-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-16-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB

    • memory/1484-17-0x0000000000400000-0x0000000000447000-memory.dmp

      Filesize

      284KB