Analysis

  • max time kernel
    150s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2025 03:55

General

  • Target

    bb1c2855bc714e5ce04b01662bda65749be5d2c098b3b2e479d1fd45959a512d.exe

  • Size

    1.6MB

  • MD5

    13ad5c8995942aa7f8c6da81fe536517

  • SHA1

    b5f506d6eccd3e66c8f6e73ce7d570083482c087

  • SHA256

    bb1c2855bc714e5ce04b01662bda65749be5d2c098b3b2e479d1fd45959a512d

  • SHA512

    96b8f114529c805fabe71300a2463c6c62a50cfd289e1a06e9729389a246edfb9ba83c3446d33e804a067d94541a3a1c3b3179caddca711df4aa46c9a7a1b249

  • SSDEEP

    24576:r0yOdKnqj9MNrOoThmBZTsl3WaPECkDtGQjnEd7DSVXT5X1hng:gSqj9MxOt83J/kwonPXT5X1hg

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb1c2855bc714e5ce04b01662bda65749be5d2c098b3b2e479d1fd45959a512d.exe
    "C:\Users\Admin\AppData\Local\Temp\bb1c2855bc714e5ce04b01662bda65749be5d2c098b3b2e479d1fd45959a512d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4436

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4436-0-0x00007FFE2C9A3000-0x00007FFE2C9A5000-memory.dmp

    Filesize

    8KB

  • memory/4436-1-0x000001D529C50000-0x000001D529C84000-memory.dmp

    Filesize

    208KB

  • memory/4436-2-0x00007FFE2C9A0000-0x00007FFE2D461000-memory.dmp

    Filesize

    10.8MB

  • memory/4436-3-0x00007FFE2C9A0000-0x00007FFE2D461000-memory.dmp

    Filesize

    10.8MB

  • memory/4436-4-0x00007FFE2C9A0000-0x00007FFE2D461000-memory.dmp

    Filesize

    10.8MB

  • memory/4436-5-0x00007FFE2C9A0000-0x00007FFE2D461000-memory.dmp

    Filesize

    10.8MB

  • memory/4436-6-0x00007FFE2C9A0000-0x00007FFE2D461000-memory.dmp

    Filesize

    10.8MB

  • memory/4436-7-0x000001D547C50000-0x000001D547C58000-memory.dmp

    Filesize

    32KB

  • memory/4436-8-0x000001D547CD0000-0x000001D547D08000-memory.dmp

    Filesize

    224KB

  • memory/4436-9-0x000001D547CA0000-0x000001D547CAE000-memory.dmp

    Filesize

    56KB

  • memory/4436-24-0x00007FFE2C9A3000-0x00007FFE2C9A5000-memory.dmp

    Filesize

    8KB

  • memory/4436-25-0x00007FFE2C9A0000-0x00007FFE2D461000-memory.dmp

    Filesize

    10.8MB

  • memory/4436-26-0x00007FFE2C9A0000-0x00007FFE2D461000-memory.dmp

    Filesize

    10.8MB

  • memory/4436-27-0x00007FFE2C9A0000-0x00007FFE2D461000-memory.dmp

    Filesize

    10.8MB

  • memory/4436-28-0x00007FFE2C9A0000-0x00007FFE2D461000-memory.dmp

    Filesize

    10.8MB

  • memory/4436-29-0x00007FFE2C9A0000-0x00007FFE2D461000-memory.dmp

    Filesize

    10.8MB