Analysis
-
max time kernel
106s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2023 10:24
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win7-20230220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Launcher.exe
Resource
win10v2004-20230220-en
1 signatures
150 seconds
General
-
Target
Launcher.exe
-
Size
13.5MB
-
MD5
766f368c59aac2939012beeacc8d5e9f
-
SHA1
c178cd6927751b512b65461e53573a93dc56df34
-
SHA256
eb140a89f01010f6348e485dcd4324252ddc06926cc1a30aa0d7ac6095f0edbb
-
SHA512
7c5bfb0fabde8e1e708529718ebc7b73998fa3bfe9239b3adfad3798722fa45a693049f9cae9642073504d9b0c94b042790b10200ebb30b360c1bedb84fe67ab
-
SSDEEP
393216:AqHUSGRf+yV374G4T56KjjjjjOdG6RECr3HwEQ:jHLGRmq85TwCw5r3m
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Launcher.exedescription pid process Token: SeDebugPrivilege 1912 Launcher.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1912-133-0x0000000000E90000-0x0000000001C0A000-memory.dmpFilesize
13.5MB
-
memory/1912-134-0x0000000006CD0000-0x0000000007274000-memory.dmpFilesize
5.6MB
-
memory/1912-135-0x0000000006480000-0x0000000006512000-memory.dmpFilesize
584KB
-
memory/1912-136-0x0000000006630000-0x000000000663A000-memory.dmpFilesize
40KB
-
memory/1912-137-0x0000000006710000-0x0000000006720000-memory.dmpFilesize
64KB
-
memory/1912-140-0x0000000006710000-0x0000000006720000-memory.dmpFilesize
64KB
-
memory/1912-141-0x000000000C4B0000-0x000000000C4CA000-memory.dmpFilesize
104KB
-
memory/1912-142-0x000000000CA70000-0x000000000CF9C000-memory.dmpFilesize
5.2MB
-
memory/1912-143-0x000000000C830000-0x000000000C838000-memory.dmpFilesize
32KB
-
memory/1912-147-0x0000000006710000-0x0000000006720000-memory.dmpFilesize
64KB
-
memory/1912-148-0x0000000006710000-0x0000000006720000-memory.dmpFilesize
64KB