Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 09:10

General

  • Target

    copy#5061320.exe

  • Size

    218KB

  • MD5

    5885110cf2e5bc6e8a83efe5cbc0f1ab

  • SHA1

    6db8bf11484d153a74d67f20eec4d5db63acd783

  • SHA256

    c0ec654e5d63cde6f5f53553bfc0f51b7bc266a703e896cc5f0b1635c09fb356

  • SHA512

    ce8e5c188ce910991bb864813736e8112da3a086b29f965d2799d8e4a9abd52ff95b1587f5c5175536b291e96258f1d15fca57e637c65d6406b80e2b75c49072

  • SSDEEP

    3072:gdbQw5tKM/717+wUPnS21mQbnc+BR0pKREX/WONBuwrhmc7U1iIyx1IhNXOXcalw:H+86uwrhmkErFDnXAgdH

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\copy#5061320.exe
    "C:\Users\Admin\AppData\Local\Temp\copy#5061320.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1016

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1016-0-0x000000007452E000-0x000000007452F000-memory.dmp

    Filesize

    4KB

  • memory/1016-1-0x00000000001A0000-0x00000000001DA000-memory.dmp

    Filesize

    232KB

  • memory/1016-2-0x0000000004B80000-0x0000000004C12000-memory.dmp

    Filesize

    584KB

  • memory/1016-3-0x0000000074520000-0x0000000074CD0000-memory.dmp

    Filesize

    7.7MB

  • memory/1016-4-0x000000007452E000-0x000000007452F000-memory.dmp

    Filesize

    4KB

  • memory/1016-5-0x0000000074520000-0x0000000074CD0000-memory.dmp

    Filesize

    7.7MB