Analysis

  • max time kernel
    51s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/06/2024, 20:49

General

  • Target

    MEMCHK64Svc.exe

  • Size

    140KB

  • MD5

    ae0e48b0dd7ca9ca657c487929bc2b65

  • SHA1

    19fd9c6e1eae068404b1456d18941c9698ec4582

  • SHA256

    8d6e23ef538162332109112791612596cce3951859de8afd0bc99fd41197ca64

  • SHA512

    23ce53cce244ee2a0262a82983446ef5855bba9d817310298f2b25efcd9a16c38646fbcd1c6eacd7199d7f2d6d65219587e1a675cc5659301030cfe81eac9195

  • SSDEEP

    3072:RLx1KMGkF9kFTnW/U8DIJsfl4naS/ZSCR4pJaNG0MNqY:RfSZj2I6fl4nvSCEaNG5q

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MEMCHK64Svc.exe
    "C:\Users\Admin\AppData\Local\Temp\MEMCHK64Svc.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4088

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4088-0-0x0000027BA9EF0000-0x0000027BA9F1C000-memory.dmp

          Filesize

          176KB

        • memory/4088-1-0x00007FFE14C73000-0x00007FFE14C75000-memory.dmp

          Filesize

          8KB

        • memory/4088-2-0x0000027BAA2B0000-0x0000027BAA2B6000-memory.dmp

          Filesize

          24KB

        • memory/4088-3-0x0000027BAA460000-0x0000027BAA47E000-memory.dmp

          Filesize

          120KB

        • memory/4088-4-0x00007FFE14C70000-0x00007FFE15731000-memory.dmp

          Filesize

          10.8MB

        • memory/4088-5-0x0000027BAA480000-0x0000027BAA486000-memory.dmp

          Filesize

          24KB

        • memory/4088-7-0x00007FFE14C70000-0x00007FFE15731000-memory.dmp

          Filesize

          10.8MB