Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2023 13:26
Static task
static1
Behavioral task
behavioral1
Sample
icsu.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
icsu.exe
Resource
win10v2004-20230703-en
General
-
Target
icsu.exe
-
Size
161KB
-
MD5
6cd2df769b23201a6e5ca0e4bbdbb59b
-
SHA1
359b1926d9cb5063f66c3d191532de4f688b32af
-
SHA256
2aa5cc0e3a67d2aaa080ff0e22893f3478e467e983d6e99017a16ae09992d5c0
-
SHA512
24a5cdd30190e7a0d12e7067175082667639b489c241abcac06f284587fd7cf850d39235eb9ea16d43545b420d586e8875b6e8eb947bd25cf06d778ecf30b385
-
SSDEEP
3072:lSH5teUV07aedNqBcIjQCCVw/LQZsin01RdDBQcbiBginj8V3K12LB:YHreUV0ueX2/mVw/Lal01RJOcbijMd
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3740 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\icsu.exe"C:\Users\Admin\AppData\Local\Temp\icsu.exe"1⤵PID:2860
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3740
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD58fdde29b52107ec0b387babad1bacf91
SHA13ccd43ae7189ef93e7042aaee85625d6314ff44d
SHA256a3cb8114121d807f15e1cd9ed6278445e5c7ac6d8ffdb571bd4d2c61c53b2bfc
SHA512984b8bb9e2e4a82b0b2d3cfee3318a398939c9671fac8556dc7be9893bde816c3d39fced4197db376421bb9864bc1e8fd226d4b74dfee9c5e8ed35ddf64c6bd8