Resubmissions
26-04-2023 01:50
230426-b9bg3aec93 306-12-2022 18:46
221206-xepxvsdd29 1006-12-2022 18:33
221206-w697fafd3y 10Analysis
-
max time kernel
42s -
max time network
49s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
26-04-2023 01:50
Static task
static1
Behavioral task
behavioral1
Sample
a-Yaoofdkgd.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
a-Yaoofdkgd.exe
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
a-Yaoofdkgd.exe
Resource
win10v2004-20230220-en
General
-
Target
a-Yaoofdkgd.exe
-
Size
12KB
-
MD5
2302e560d434d30be97e72035c203088
-
SHA1
8a018ebd03f0ea55b09fcbd602725570c7a2a4d2
-
SHA256
befbb0f6ce9243f8dfbf40cec9d2c8dd829f289758b0749d8ad807bc1dd0fdb1
-
SHA512
ab84e7c726c2dc70b535f3b0dbc6bd114bb18aff08d376ee9e166b2828464d3988fe9a9d61dbd1279d42e758305f2d4644ddab79ac31e57f13e3db66824a529e
-
SSDEEP
192:5r0rom3lP2KEN18VqYH5pqmnd1C7Dg5pbW1wFb/SWA0VLWx8stYcFmVc03KY:M51H5AmnCKw1vWA0VLWxptYcFmVc03K
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a-Yaoofdkgd.exedescription pid process Token: SeDebugPrivilege 3992 a-Yaoofdkgd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a-Yaoofdkgd.exe"C:\Users\Admin\AppData\Local\Temp\a-Yaoofdkgd.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4212