Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-01-2025 20:05

General

  • Target

    e0bf9ae69d10f338a17dafcd72c4f31af5962dded70ea0a9d485f9f2ff6d60dc.exe

  • Size

    1.5MB

  • MD5

    24ce50cebbb941fdb4b567679c12f713

  • SHA1

    aac7914617e9e5163f655cb12507c31e1e62c0d2

  • SHA256

    e0bf9ae69d10f338a17dafcd72c4f31af5962dded70ea0a9d485f9f2ff6d60dc

  • SHA512

    c61537078c42282708ff18a2e8d34d8ea776e5b6f5df75429f7d153c6406645bbf57a3de31c6b4a599c494b6247cc2a395163239564f5f86df80edb4a48073cc

  • SSDEEP

    24576:GpRl1R0dnN3Ctp20wJLh4918U6HdjwuLGdya3AWOENDSVXT5XV:GpRl1WStpwv4n8vcuyd1w4SXT5XV

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0bf9ae69d10f338a17dafcd72c4f31af5962dded70ea0a9d485f9f2ff6d60dc.exe
    "C:\Users\Admin\AppData\Local\Temp\e0bf9ae69d10f338a17dafcd72c4f31af5962dded70ea0a9d485f9f2ff6d60dc.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4376

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4376-0-0x00007FFEF9FB3000-0x00007FFEF9FB5000-memory.dmp

    Filesize

    8KB

  • memory/4376-1-0x000001F1DA7C0000-0x000001F1DA7F4000-memory.dmp

    Filesize

    208KB

  • memory/4376-2-0x00007FFEF9FB0000-0x00007FFEFAA71000-memory.dmp

    Filesize

    10.8MB

  • memory/4376-3-0x00007FFEF9FB0000-0x00007FFEFAA71000-memory.dmp

    Filesize

    10.8MB

  • memory/4376-4-0x00007FFEF9FB0000-0x00007FFEFAA71000-memory.dmp

    Filesize

    10.8MB

  • memory/4376-5-0x00007FFEF9FB0000-0x00007FFEFAA71000-memory.dmp

    Filesize

    10.8MB

  • memory/4376-6-0x000001F1F4DF0000-0x000001F1F4DF8000-memory.dmp

    Filesize

    32KB

  • memory/4376-9-0x000001F1F4E40000-0x000001F1F4E4E000-memory.dmp

    Filesize

    56KB

  • memory/4376-8-0x000001F1F4E70000-0x000001F1F4EA8000-memory.dmp

    Filesize

    224KB

  • memory/4376-7-0x00007FFEF9FB0000-0x00007FFEFAA71000-memory.dmp

    Filesize

    10.8MB

  • memory/4376-22-0x00007FFEF9FB3000-0x00007FFEF9FB5000-memory.dmp

    Filesize

    8KB

  • memory/4376-23-0x00007FFEF9FB0000-0x00007FFEFAA71000-memory.dmp

    Filesize

    10.8MB

  • memory/4376-24-0x00007FFEF9FB0000-0x00007FFEFAA71000-memory.dmp

    Filesize

    10.8MB

  • memory/4376-25-0x00007FFEF9FB0000-0x00007FFEFAA71000-memory.dmp

    Filesize

    10.8MB

  • memory/4376-26-0x00007FFEF9FB0000-0x00007FFEFAA71000-memory.dmp

    Filesize

    10.8MB