Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/04/2024, 01:18

General

  • Target

    a0bb7ccb1d327da9bd3622bd33a7c97fb72aeaae8640f29a5c7d7e8e72634759.exe

  • Size

    702KB

  • MD5

    00a5f26eaef5205e774b7351e70de72e

  • SHA1

    7839023780814793e51bc38a439c7243070aabde

  • SHA256

    a0bb7ccb1d327da9bd3622bd33a7c97fb72aeaae8640f29a5c7d7e8e72634759

  • SHA512

    bd0181f6a42bb19f38ec9ca9b0dfeb934c2a9e6111859c98222d98a12ced8f509cb5f3dc0975721a293491fc895c3bd76dd223e6d680d5790be1c12a0fc1d35c

  • SSDEEP

    12288:nSOFz/kh6FggLbrQXbR7jqkf1Hm7tJc0FS3jicGWVSI7dMua43Ek0cIHAN4:RFj06LaRFdGJm0Q3WKVSwdr13Ek0VA

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0bb7ccb1d327da9bd3622bd33a7c97fb72aeaae8640f29a5c7d7e8e72634759.exe
    "C:\Users\Admin\AppData\Local\Temp\a0bb7ccb1d327da9bd3622bd33a7c97fb72aeaae8640f29a5c7d7e8e72634759.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2712

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2712-0-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB

        • memory/2712-1-0x0000000002320000-0x0000000002387000-memory.dmp

          Filesize

          412KB

        • memory/2712-6-0x0000000002320000-0x0000000002387000-memory.dmp

          Filesize

          412KB

        • memory/2712-10-0x0000000000400000-0x00000000004B6000-memory.dmp

          Filesize

          728KB