Analysis

  • max time kernel
    104s
  • max time network
    214s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250313-de
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250313-delocale:de-deos:windows10-ltsc_2021-x64systemwindows
  • submitted
    31/03/2025, 18:04

General

  • Target

    cmd.exe

  • Size

    339KB

  • MD5

    4a78d40c29579dc26ba135c01ac56158

  • SHA1

    9c61028daf68777bbb0671036417f093078ca1d7

  • SHA256

    23600c9b4425c2cc05a8e17adc39e6fa8c0c16983289abf2b4cae68ae6535b3b

  • SHA512

    ada8df846dd8d0a6706b3bb0e4f5ba43f84e8ef634ac7d10370ec118537c7b33d8ce4a3e680a8d2a6593b87531819f3cfdb1cf1291ac7d2589707fc6fa0e7969

  • SSDEEP

    3072:+m+FrFLPdIuW/cRdyYZ2r1J0ZNk5TP8VveGX5If5V8KBA2Rtml6cBLV4adiQLeIc:P+FrFPWv/eFZNk5L8V/iBV8yIRR4sOEq

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\cmd.exe
    "C:\Users\Admin\AppData\Local\Temp\cmd.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/116-1-0x000001CDD95C0000-0x000001CDD9614000-memory.dmp

    Filesize

    336KB

  • memory/116-0-0x00007FF8E85E3000-0x00007FF8E85E5000-memory.dmp

    Filesize

    8KB

  • memory/116-2-0x00007FF8E85E0000-0x00007FF8E90A2000-memory.dmp

    Filesize

    10.8MB

  • memory/116-3-0x000001CDF3C40000-0x000001CDF3D44000-memory.dmp

    Filesize

    1.0MB

  • memory/116-6-0x00007FF8E85E0000-0x00007FF8E90A2000-memory.dmp

    Filesize

    10.8MB

  • memory/116-8-0x00007FF8E85E0000-0x00007FF8E90A2000-memory.dmp

    Filesize

    10.8MB