Analysis
-
max time kernel
124s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exe
Resource
win10v2004-20240611-en
General
-
Target
630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exe
-
Size
278KB
-
MD5
66a3124fe4ed45fae20e2bd4ee33c626
-
SHA1
fc5ef4caf4d8a51a340f6fd98ac525debcff8f30
-
SHA256
630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad
-
SHA512
569bc064f465c32fd11fdd67896106778f13094e20adc739d8824f9e02508701b712bd3cfdab48782421b35acebe16bb5b0e97543db869ecaec5c1b87902b872
-
SSDEEP
6144:sU0sd0bzy1GOgofaePZ3e5fv+vc6X+olz:XzHGOgovPwcXbl
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exepid process 2072 630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exedescription pid process Token: SeDebugPrivilege 2072 630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exe"C:\Users\Admin\AppData\Local\Temp\630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2072-0-0x0000000074E5E000-0x0000000074E5F000-memory.dmpFilesize
4KB
-
memory/2072-1-0x0000000000BE0000-0x0000000000C2C000-memory.dmpFilesize
304KB
-
memory/2072-2-0x0000000005C90000-0x0000000006234000-memory.dmpFilesize
5.6MB
-
memory/2072-3-0x0000000005630000-0x00000000056C2000-memory.dmpFilesize
584KB
-
memory/2072-4-0x00000000056E0000-0x000000000571E000-memory.dmpFilesize
248KB
-
memory/2072-5-0x00000000057E0000-0x000000000587C000-memory.dmpFilesize
624KB
-
memory/2072-6-0x00000000057B0000-0x00000000057C8000-memory.dmpFilesize
96KB
-
memory/2072-7-0x0000000074E50000-0x0000000075600000-memory.dmpFilesize
7.7MB
-
memory/2072-8-0x0000000005C40000-0x0000000005C46000-memory.dmpFilesize
24KB
-
memory/2072-9-0x00000000062B0000-0x0000000006316000-memory.dmpFilesize
408KB
-
memory/2072-10-0x0000000074E5E000-0x0000000074E5F000-memory.dmpFilesize
4KB
-
memory/2072-11-0x0000000074E50000-0x0000000075600000-memory.dmpFilesize
7.7MB