Analysis

  • max time kernel
    131s
  • max time network
    214s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-de
  • resource tags

    arch:x64arch:x86image:win11-20250313-delocale:de-deos:windows11-21h2-x64systemwindows
  • submitted
    31/03/2025, 18:04

General

  • Target

    cmd.exe

  • Size

    339KB

  • MD5

    4a78d40c29579dc26ba135c01ac56158

  • SHA1

    9c61028daf68777bbb0671036417f093078ca1d7

  • SHA256

    23600c9b4425c2cc05a8e17adc39e6fa8c0c16983289abf2b4cae68ae6535b3b

  • SHA512

    ada8df846dd8d0a6706b3bb0e4f5ba43f84e8ef634ac7d10370ec118537c7b33d8ce4a3e680a8d2a6593b87531819f3cfdb1cf1291ac7d2589707fc6fa0e7969

  • SSDEEP

    3072:+m+FrFLPdIuW/cRdyYZ2r1J0ZNk5TP8VveGX5If5V8KBA2Rtml6cBLV4adiQLeIc:P+FrFPWv/eFZNk5L8V/iBV8yIRR4sOEq

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\cmd.exe
    "C:\Users\Admin\AppData\Local\Temp\cmd.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:5344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5344-0-0x00007FF9D54B3000-0x00007FF9D54B5000-memory.dmp

    Filesize

    8KB

  • memory/5344-1-0x00000234393C0000-0x0000023439414000-memory.dmp

    Filesize

    336KB

  • memory/5344-23-0x0000023453C10000-0x0000023453D14000-memory.dmp

    Filesize

    1.0MB

  • memory/5344-31-0x00007FF9D54B0000-0x00007FF9D5F72000-memory.dmp

    Filesize

    10.8MB

  • memory/5344-39-0x00007FF9D54B0000-0x00007FF9D5F72000-memory.dmp

    Filesize

    10.8MB

  • memory/5344-40-0x00007FF9D54B0000-0x00007FF9D5F72000-memory.dmp

    Filesize

    10.8MB