Analysis

  • max time kernel
    91s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-06-2024 12:41

General

  • Target

    TSwOumb0f34.exe

  • Size

    2.4MB

  • MD5

    027834b2ebc7f1b02143d8e7f8c17aab

  • SHA1

    c4d19cab893e0fcb19d5de25e26e441faceb88ee

  • SHA256

    5b740dd5064d571eb065d94e252b11dd2c5ff0f82e7932c06c4acfd55e5a0cb1

  • SHA512

    0c87b7ddc9ec8b32ed9a787cb633d232cca78cb58d0b42fe2ffc7206498d2121c608b45b6f5cc696cf96d2b771385036abfb2b19b6d1a6d6d133dc7a867af353

  • SSDEEP

    49152:P2TxAt739Kik+gzh+VWNBmsXn1JObl7J6fDKz0vqsS8+5wYAeU3ki65n3e2:nh39KhrykBmsnOL6L40/S83sx

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TSwOumb0f34.exe
    "C:\Users\Admin\AppData\Local\Temp\TSwOumb0f34.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2084
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3472

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2084-0-0x0000000074A2E000-0x0000000074A2F000-memory.dmp

      Filesize

      4KB

    • memory/2084-1-0x0000000000D90000-0x0000000001006000-memory.dmp

      Filesize

      2.5MB

    • memory/2084-2-0x0000000074A20000-0x00000000751D0000-memory.dmp

      Filesize

      7.7MB

    • memory/2084-4-0x0000000074A20000-0x00000000751D0000-memory.dmp

      Filesize

      7.7MB