Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2025 02:55

General

  • Target

    b46687676bf1ea80f737b3891c0058970d7ef18011667bc7cc32ca46ee5dd993.exe

  • Size

    1.4MB

  • MD5

    0c3dea3fd2db16c5efbdbaeb7010eec6

  • SHA1

    7940f6189245ed6c97ae3cf68614adf0e37e66d6

  • SHA256

    b46687676bf1ea80f737b3891c0058970d7ef18011667bc7cc32ca46ee5dd993

  • SHA512

    b2dd420d7490a3485c0d64b0e75bf72ad8748a6ff785ebedcc0863cf65a8927e4f5def8069279041265789cb43346e12bf14bf0e0a5f0cea2f4481c4fb403e90

  • SSDEEP

    24576:zS2r2fUlJc3K9h1d4jWUzrq4xQkQvwZHbJ7Bx4ZDSgsoid:08o3ehLq5rq4fQvwNV774bid

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b46687676bf1ea80f737b3891c0058970d7ef18011667bc7cc32ca46ee5dd993.exe
    "C:\Users\Admin\AppData\Local\Temp\b46687676bf1ea80f737b3891c0058970d7ef18011667bc7cc32ca46ee5dd993.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4728

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4728-0-0x00007FFA6A303000-0x00007FFA6A305000-memory.dmp

    Filesize

    8KB

  • memory/4728-1-0x000001E827840000-0x000001E827888000-memory.dmp

    Filesize

    288KB

  • memory/4728-2-0x00007FFA6A300000-0x00007FFA6ADC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4728-3-0x00007FFA6A300000-0x00007FFA6ADC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4728-6-0x00007FFA6A300000-0x00007FFA6ADC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4728-7-0x00007FFA6A300000-0x00007FFA6ADC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4728-9-0x00007FFA6A300000-0x00007FFA6ADC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4728-19-0x00007FFA6A303000-0x00007FFA6A305000-memory.dmp

    Filesize

    8KB

  • memory/4728-20-0x00007FFA6A300000-0x00007FFA6ADC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4728-21-0x00007FFA6A300000-0x00007FFA6ADC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4728-22-0x00007FFA6A300000-0x00007FFA6ADC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4728-23-0x00007FFA6A300000-0x00007FFA6ADC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4728-24-0x00007FFA6A300000-0x00007FFA6ADC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4728-25-0x00007FFA6A300000-0x00007FFA6ADC1000-memory.dmp

    Filesize

    10.8MB