Analysis

  • max time kernel
    101s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 05:59

General

  • Target

    582198511d8de626318829093c719f74294f96054bcb516fba4274d6a3a29346.exe

  • Size

    1.2MB

  • MD5

    6fd11aeb1060cb56aecb44a6deae5c9a

  • SHA1

    f63a38be33ffe3963af7f65f28217fd7c3329534

  • SHA256

    582198511d8de626318829093c719f74294f96054bcb516fba4274d6a3a29346

  • SHA512

    80c20c6249626d26b2a625fc3c01f289b43783ac80e4ba0d30621f886b80e40c5130b21526fd490fb7f5cddaffa8d33cfaea7ea1dff0abc85bc36422e6e31e72

  • SSDEEP

    192:xPuTunAtt5Pg1lld07xFVd4yywe/2D4Ec7KdT:tYcAP+PlOzVdNpe/REmi

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\582198511d8de626318829093c719f74294f96054bcb516fba4274d6a3a29346.exe
    "C:\Users\Admin\AppData\Local\Temp\582198511d8de626318829093c719f74294f96054bcb516fba4274d6a3a29346.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:212

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/212-0-0x0000000074CDE000-0x0000000074CDF000-memory.dmp

    Filesize

    4KB

  • memory/212-1-0x0000000000EA0000-0x0000000000EAA000-memory.dmp

    Filesize

    40KB

  • memory/212-2-0x0000000005890000-0x0000000005922000-memory.dmp

    Filesize

    584KB

  • memory/212-3-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB

  • memory/212-4-0x00000000061B0000-0x0000000006754000-memory.dmp

    Filesize

    5.6MB

  • memory/212-5-0x0000000006130000-0x0000000006196000-memory.dmp

    Filesize

    408KB

  • memory/212-6-0x0000000074CDE000-0x0000000074CDF000-memory.dmp

    Filesize

    4KB

  • memory/212-7-0x0000000074CD0000-0x0000000075480000-memory.dmp

    Filesize

    7.7MB