Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2023 19:10
Behavioral task
behavioral1
Sample
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe
Resource
win10v2004-20230621-en
General
-
Target
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe
-
Size
2.2MB
-
MD5
4f9f6ae17f803c184847337451fa1ca9
-
SHA1
3b051fa1afa3d98d7abecab816d0bac9e51be0aa
-
SHA256
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07
-
SHA512
b98d78494f82307f187fdfbccc875fc8ce4bf6bec1d678ad18f4aeae79dddd402690b5b2c2d5accf1393f018cbca7f264cbd3fd3bce4fc349b27145f6ec052ae
-
SSDEEP
49152:XeE2JNiuIdtb7mqxw1P3UbtibDk8eO1q+UTJHwnS891AeE7:XN4NiuwORUbtAeO1qP98j9H
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exepid process 4712 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exedescription pid process Token: SeDebugPrivilege 4712 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exepid process 4712 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe 4712 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe 4712 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe 4712 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe 4712 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe 4712 35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe"C:\Users\Admin\AppData\Local\Temp\35733476c922b4e175cc3fef6d890746c29c8de26fad88b01ba33a3d9a272b07.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5d7a9b68b82f181f086db867c9cbf79a2
SHA18ab3bd43e1b5e2b9865be460b8ce7ed68311df05
SHA25638ac81b23cbd826f6a7ae115366565c00cabf3433bf1956dfc1154150f251cd0
SHA512f49ebdedb6329ebfd5120df7466a41164603750d4803de1a01f13c66e33d870d79ea92c8580eba821ea14c577aa9650b03ea321853b3ed9d281b39491e6b4cc7