Resubmissions

20/05/2025, 20:23

250520-y572ss1qv8 10

20/05/2025, 20:10

250520-yx65jabr7v 10

14/05/2025, 08:25

250514-kbrwtsfk31 10

Analysis

  • max time kernel
    144s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250502-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250502-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2025, 20:10

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5372

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/5372-0-0x00007FFFC5105000-0x00007FFFC5106000-memory.dmp

          Filesize

          4KB

        • memory/5372-1-0x00007FFFC4E50000-0x00007FFFC57F1000-memory.dmp

          Filesize

          9.6MB

        • memory/5372-2-0x000000001C0E0000-0x000000001C5AE000-memory.dmp

          Filesize

          4.8MB

        • memory/5372-3-0x000000001BAE0000-0x000000001BB86000-memory.dmp

          Filesize

          664KB

        • memory/5372-4-0x00007FFFC4E50000-0x00007FFFC57F1000-memory.dmp

          Filesize

          9.6MB

        • memory/5372-5-0x000000001C620000-0x000000001C682000-memory.dmp

          Filesize

          392KB

        • memory/5372-6-0x000000001CEF0000-0x000000001CF8C000-memory.dmp

          Filesize

          624KB

        • memory/5372-7-0x00007FFFC5105000-0x00007FFFC5106000-memory.dmp

          Filesize

          4KB

        • memory/5372-8-0x00007FFFC4E50000-0x00007FFFC57F1000-memory.dmp

          Filesize

          9.6MB