Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2025 17:46

General

  • Target

    2e3f54ce71e7795ac1e5ac69f99f60885a0c06ccb63d62eb2ef4a309a38cea61.exe

  • Size

    1.4MB

  • MD5

    ae301a42af47ca06e1ffc61f2d2b469e

  • SHA1

    266c4327e7f9514f7220b05fd4219269727a0e90

  • SHA256

    2e3f54ce71e7795ac1e5ac69f99f60885a0c06ccb63d62eb2ef4a309a38cea61

  • SHA512

    096f181c328c1dc58212888211d1cc5c8891d3759ee990a45f45109dfd22a87b742a29efe60e2a5a355068dcfb0551704b349f23c011e772abc10a98058a600a

  • SSDEEP

    24576:YlIFWm3UdC7AVOnrl/6aucZnCDFrNTDSDx+yab:7k1VqB6yZnSf1b

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e3f54ce71e7795ac1e5ac69f99f60885a0c06ccb63d62eb2ef4a309a38cea61.exe
    "C:\Users\Admin\AppData\Local\Temp\2e3f54ce71e7795ac1e5ac69f99f60885a0c06ccb63d62eb2ef4a309a38cea61.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3440

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3440-3-0x00007FFF96933000-0x00007FFF96935000-memory.dmp

    Filesize

    8KB

  • memory/3440-2-0x00000218A87E0000-0x00000218A8812000-memory.dmp

    Filesize

    200KB

  • memory/3440-6-0x00007FFF96930000-0x00007FFF973F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3440-7-0x00007FFF96930000-0x00007FFF973F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3440-8-0x00007FFF96930000-0x00007FFF973F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3440-9-0x00007FFF96930000-0x00007FFF973F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3440-10-0x00000218C6520000-0x00000218C6528000-memory.dmp

    Filesize

    32KB

  • memory/3440-13-0x00000218C6540000-0x00000218C654E000-memory.dmp

    Filesize

    56KB

  • memory/3440-12-0x00000218C6BB0000-0x00000218C6BE8000-memory.dmp

    Filesize

    224KB

  • memory/3440-11-0x00007FFF96930000-0x00007FFF973F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3440-23-0x00007FFF96933000-0x00007FFF96935000-memory.dmp

    Filesize

    8KB

  • memory/3440-24-0x00007FFF96930000-0x00007FFF973F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3440-25-0x00007FFF96930000-0x00007FFF973F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3440-26-0x00007FFF96930000-0x00007FFF973F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3440-27-0x00007FFF96930000-0x00007FFF973F1000-memory.dmp

    Filesize

    10.8MB

  • memory/3440-28-0x00007FFF96930000-0x00007FFF973F1000-memory.dmp

    Filesize

    10.8MB