Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 16:58

General

  • Target

    DUMPSEC.exe

  • Size

    484KB

  • MD5

    6e2e47181c35f0ba6656c8e2833387cc

  • SHA1

    622970c4537133af74dc371b6545a31ed4ab2567

  • SHA256

    11e292da4ed9c774fb3e2ed905ca2040c999a68241ff39946f0b32fc8f7e0bcb

  • SHA512

    1cdd3374c5aae339e76191ecea29f52806746ddb0229b2cdd5e4874eb54016d625454c652c5b89d92a2bc88765933d873fe12d12b385c9bebf87d0c6aac3d8c1

  • SSDEEP

    12288:RidZsiJveEjeMcrWV3jOFgwglrVxnS0EueBjI/:R8kEjeMUlFgw+VCFs

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DUMPSEC.exe
    "C:\Users\Admin\AppData\Local\Temp\DUMPSEC.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3128

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads