Analysis

  • max time kernel
    227s
  • max time network
    293s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-de
  • resource tags

    arch:x64arch:x86image:win11-20250313-delocale:de-deos:windows11-21h2-x64systemwindows
  • submitted
    31/03/2025, 18:04

General

  • Target

    cmd.exe

  • Size

    339KB

  • MD5

    4a78d40c29579dc26ba135c01ac56158

  • SHA1

    9c61028daf68777bbb0671036417f093078ca1d7

  • SHA256

    23600c9b4425c2cc05a8e17adc39e6fa8c0c16983289abf2b4cae68ae6535b3b

  • SHA512

    ada8df846dd8d0a6706b3bb0e4f5ba43f84e8ef634ac7d10370ec118537c7b33d8ce4a3e680a8d2a6593b87531819f3cfdb1cf1291ac7d2589707fc6fa0e7969

  • SSDEEP

    3072:+m+FrFLPdIuW/cRdyYZ2r1J0ZNk5TP8VveGX5If5V8KBA2Rtml6cBLV4adiQLeIc:P+FrFPWv/eFZNk5L8V/iBV8yIRR4sOEq

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\cmd.exe
    "C:\Users\Admin\AppData\Local\Temp\cmd.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:5696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5696-0-0x00007FFF0A7A3000-0x00007FFF0A7A5000-memory.dmp

    Filesize

    8KB

  • memory/5696-1-0x0000017D0D630000-0x0000017D0D684000-memory.dmp

    Filesize

    336KB

  • memory/5696-32-0x00007FFF0A7A0000-0x00007FFF0B262000-memory.dmp

    Filesize

    10.8MB

  • memory/5696-34-0x0000017D27E80000-0x0000017D27F84000-memory.dmp

    Filesize

    1.0MB

  • memory/5696-38-0x00007FFF0A7A0000-0x00007FFF0B262000-memory.dmp

    Filesize

    10.8MB

  • memory/5696-40-0x00007FFF0A7A0000-0x00007FFF0B262000-memory.dmp

    Filesize

    10.8MB