Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-10-2024 09:51

General

  • Target

    12.exe

  • Size

    538KB

  • MD5

    227cb9e343ab7e59cc94e59390ddb86e

  • SHA1

    e343bec355502aa976aa4af68dbcf1375634c023

  • SHA256

    03a286d22e67960007008b0a69e0492310f06434e640b3ede36ea09b78e54a7a

  • SHA512

    3475a05932e235e23c54bd8be49fd856cbbab474f6f925d0c6ce6f0450cd073c4febd3705d52b596b35dab0c881e688a7b56f04f2a62c6315d7ad660462e1169

  • SSDEEP

    6144:YYqdc0NkzDVx/j6TIlA41V1cN3p0NIb88WsNMPaKFP3b2V122J0sL:Y9J837zPcN3CNIb88WsNMP5F1k

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12.exe
    "C:\Users\Admin\AppData\Local\Temp\12.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3144

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3144-0-0x00007FFCFA393000-0x00007FFCFA395000-memory.dmp

    Filesize

    8KB

  • memory/3144-1-0x0000000000440000-0x00000000004CC000-memory.dmp

    Filesize

    560KB

  • memory/3144-2-0x00007FFCFA390000-0x00007FFCFAE51000-memory.dmp

    Filesize

    10.8MB

  • memory/3144-3-0x000000001F220000-0x000000001F32A000-memory.dmp

    Filesize

    1.0MB

  • memory/3144-5-0x000000001C1F0000-0x000000001C22C000-memory.dmp

    Filesize

    240KB

  • memory/3144-4-0x000000001B110000-0x000000001B122000-memory.dmp

    Filesize

    72KB

  • memory/3144-6-0x00007FFCFA393000-0x00007FFCFA395000-memory.dmp

    Filesize

    8KB

  • memory/3144-7-0x00007FFCFA390000-0x00007FFCFAE51000-memory.dmp

    Filesize

    10.8MB