Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/06/2024, 14:23

General

  • Target

    737cd1e883a521f9280a4e3edf1dc2f8c142a4e80b3fea5fb079c58a793e77a8.exe

  • Size

    332KB

  • MD5

    66ee45788fe1ae30ad1ce6a7a13d7c6d

  • SHA1

    6a28b84470f790ef8f931b6c2b8c53d66b26e170

  • SHA256

    737cd1e883a521f9280a4e3edf1dc2f8c142a4e80b3fea5fb079c58a793e77a8

  • SHA512

    c65bfdb8c5d50e073b934a1ce1aa19f5989f2559d3ae79c68a811f75974cdb0b1203284345d20f0e4daa8ff99d65d3c270c575b90b522d0551255141682c2033

  • SSDEEP

    768:eLQ+Q720zEjss2Hcg1Ijcn0sspAlpq8WLyg1uMN0+dzsR8+eEO:ec+QLUWpqZLy0uyL+fO

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\737cd1e883a521f9280a4e3edf1dc2f8c142a4e80b3fea5fb079c58a793e77a8.exe
    "C:\Users\Admin\AppData\Local\Temp\737cd1e883a521f9280a4e3edf1dc2f8c142a4e80b3fea5fb079c58a793e77a8.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3080

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3080-0-0x000000007449E000-0x000000007449F000-memory.dmp

    Filesize

    4KB

  • memory/3080-1-0x0000000000680000-0x00000000006D8000-memory.dmp

    Filesize

    352KB

  • memory/3080-2-0x0000000074490000-0x0000000074C40000-memory.dmp

    Filesize

    7.7MB

  • memory/3080-3-0x000000007449E000-0x000000007449F000-memory.dmp

    Filesize

    4KB

  • memory/3080-4-0x0000000074490000-0x0000000074C40000-memory.dmp

    Filesize

    7.7MB