Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-01-2025 11:50

General

  • Target

    60184ec33cdcc777b68565d24bca101116b42e6d082aea9f380e304847856eb9.exe

  • Size

    1.3MB

  • MD5

    031abb9d77bc58f16e11f54683c6abc2

  • SHA1

    3b60476d13fb2bda02f19e2c8c1f8d76851c419d

  • SHA256

    60184ec33cdcc777b68565d24bca101116b42e6d082aea9f380e304847856eb9

  • SHA512

    f23d11e1a66e442a585eae3c989256c8190273e8a1bbb19b5c99e39c1855c71611eb643fd69c762e2e83d22f16229f97ab5a8525f86398f6f11baea706ef2d61

  • SSDEEP

    24576:UsHOIE6j5DiryPBPJaUMNUMFiLEjiDSVXT5Xcv6yaR:e6j5DOyPBPcAkXT5XO61R

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60184ec33cdcc777b68565d24bca101116b42e6d082aea9f380e304847856eb9.exe
    "C:\Users\Admin\AppData\Local\Temp\60184ec33cdcc777b68565d24bca101116b42e6d082aea9f380e304847856eb9.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3868-0-0x00007FFA0CDD3000-0x00007FFA0CDD5000-memory.dmp

    Filesize

    8KB

  • memory/3868-1-0x0000020AAC9D0000-0x0000020AACA04000-memory.dmp

    Filesize

    208KB

  • memory/3868-2-0x00007FFA0CDD0000-0x00007FFA0D891000-memory.dmp

    Filesize

    10.8MB

  • memory/3868-3-0x00007FFA0CDD0000-0x00007FFA0D891000-memory.dmp

    Filesize

    10.8MB

  • memory/3868-4-0x00007FFA0CDD0000-0x00007FFA0D891000-memory.dmp

    Filesize

    10.8MB

  • memory/3868-5-0x00007FFA0CDD0000-0x00007FFA0D891000-memory.dmp

    Filesize

    10.8MB

  • memory/3868-6-0x0000020AAD1C0000-0x0000020AAD1C8000-memory.dmp

    Filesize

    32KB

  • memory/3868-8-0x0000020ACAD80000-0x0000020ACAD8E000-memory.dmp

    Filesize

    56KB

  • memory/3868-7-0x0000020ACADC0000-0x0000020ACADF8000-memory.dmp

    Filesize

    224KB

  • memory/3868-23-0x00007FFA0CDD3000-0x00007FFA0CDD5000-memory.dmp

    Filesize

    8KB

  • memory/3868-24-0x00007FFA0CDD0000-0x00007FFA0D891000-memory.dmp

    Filesize

    10.8MB

  • memory/3868-25-0x00007FFA0CDD0000-0x00007FFA0D891000-memory.dmp

    Filesize

    10.8MB

  • memory/3868-26-0x00007FFA0CDD0000-0x00007FFA0D891000-memory.dmp

    Filesize

    10.8MB

  • memory/3868-27-0x00007FFA0CDD0000-0x00007FFA0D891000-memory.dmp

    Filesize

    10.8MB