Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/04/2024, 02:12

General

  • Target

    a99feb7978dd44a14a73a04e412ed75c40a9190c96e1fa5247ea493f401f7a1a.exe

  • Size

    1.6MB

  • MD5

    4b820c898665791e53432c01d9b49359

  • SHA1

    2921eaf47898a1e785a9751026097950f4f2444b

  • SHA256

    a99feb7978dd44a14a73a04e412ed75c40a9190c96e1fa5247ea493f401f7a1a

  • SHA512

    1afdc02a10904d99311af89162b839410deffce92d306f0290f3498ac8c85f55159489fe53b7564ba246d2b27418ebb5648ea7989111e972a93d6d5f29179061

  • SSDEEP

    12288:1QRlHYXc3ajG+hjQKymY8efKCpD7Gj9G6G1qT8nQkCu83L3Wl/np9DBDt3kbE:1QRlYsqjnhMgeiCl7G0nehbGZpbD

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a99feb7978dd44a14a73a04e412ed75c40a9190c96e1fa5247ea493f401f7a1a.exe
    "C:\Users\Admin\AppData\Local\Temp\a99feb7978dd44a14a73a04e412ed75c40a9190c96e1fa5247ea493f401f7a1a.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4528

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4528-0-0x0000000030000000-0x00000000301A3000-memory.dmp

          Filesize

          1.6MB

        • memory/4528-1-0x0000000000940000-0x00000000009A7000-memory.dmp

          Filesize

          412KB

        • memory/4528-6-0x0000000000940000-0x00000000009A7000-memory.dmp

          Filesize

          412KB

        • memory/4528-10-0x0000000030000000-0x00000000301A3000-memory.dmp

          Filesize

          1.6MB