Resubmissions

31/05/2023, 16:27

230531-tx8k5sga74 3

31/05/2023, 16:24

230531-twddlsga59 3

Analysis

  • max time kernel
    57s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2023, 16:24

General

  • Target

    Valyse Launcher.exe

  • Size

    2.7MB

  • MD5

    54e7d55bb6fc73c1c7fd851d260d0101

  • SHA1

    efa88fd00510cfbf1226386114df07142ed1569d

  • SHA256

    37beb1f79fe1dd0f5891b5bce0a28acfb79e6387c345e7344b5a7e4e699425f2

  • SHA512

    c97bc25478b6361a300a75907597a2e4cc1ac2c9e460c43fcc186486da39872584594de65a3a4f0cbd23d097b74a6e323759b1af95fffd6aa9db8e3bcab4733d

  • SSDEEP

    49152:4In+z8/YZ1SumIQMRiHNjS+fdKZiuubngyRiDDUXBzJHqBwbxVD:4h5Z1uI7MXgMi3sH3

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Valyse Launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\Valyse Launcher.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3948
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3400

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3948-133-0x00000000007E0000-0x0000000000AA2000-memory.dmp

      Filesize

      2.8MB

    • memory/3948-134-0x0000000005630000-0x0000000005640000-memory.dmp

      Filesize

      64KB

    • memory/3948-135-0x000000000A010000-0x000000000A048000-memory.dmp

      Filesize

      224KB

    • memory/3948-136-0x0000000009FD0000-0x0000000009FDE000-memory.dmp

      Filesize

      56KB

    • memory/3948-137-0x0000000005630000-0x0000000005640000-memory.dmp

      Filesize

      64KB

    • memory/3948-138-0x0000000005630000-0x0000000005640000-memory.dmp

      Filesize

      64KB

    • memory/3948-139-0x0000000005630000-0x0000000005640000-memory.dmp

      Filesize

      64KB

    • memory/3948-140-0x0000000005630000-0x0000000005640000-memory.dmp

      Filesize

      64KB