Analysis

  • max time kernel
    44s
  • max time network
    38s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • submitted
    02-05-2024 19:33

General

  • Target

    rat/Extreme Injector v3.exe

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rat\Extreme Injector v3.exe
    "C:\Users\Admin\AppData\Local\Temp\rat\Extreme Injector v3.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:464

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/464-0-0x00007FFCF8A43000-0x00007FFCF8A45000-memory.dmp

    Filesize

    8KB

  • memory/464-1-0x0000000000C30000-0x0000000000E16000-memory.dmp

    Filesize

    1.9MB

  • memory/464-2-0x00007FFCF8A40000-0x00007FFCF9501000-memory.dmp

    Filesize

    10.8MB

  • memory/464-3-0x000000001C920000-0x000000001C932000-memory.dmp

    Filesize

    72KB

  • memory/464-4-0x000000001CDE0000-0x000000001CE1C000-memory.dmp

    Filesize

    240KB

  • memory/464-6-0x00007FFCF8A40000-0x00007FFCF9501000-memory.dmp

    Filesize

    10.8MB

  • memory/464-7-0x00007FFCF8A40000-0x00007FFCF9501000-memory.dmp

    Filesize

    10.8MB

  • memory/464-8-0x00007FFCF8A43000-0x00007FFCF8A45000-memory.dmp

    Filesize

    8KB

  • memory/464-9-0x00007FFCF8A40000-0x00007FFCF9501000-memory.dmp

    Filesize

    10.8MB

  • memory/464-10-0x00007FFCF8A40000-0x00007FFCF9501000-memory.dmp

    Filesize

    10.8MB

  • memory/464-11-0x00007FFCF8A40000-0x00007FFCF9501000-memory.dmp

    Filesize

    10.8MB

  • memory/464-13-0x00007FFCF8A40000-0x00007FFCF9501000-memory.dmp

    Filesize

    10.8MB