Analysis
-
max time kernel
1368s -
max time network
1157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2023, 04:20
Behavioral task
behavioral1
Sample
86e3e7dc9cafd72776d32eb551e0c4ee69414037480024a2667843d621860502.zip
Resource
win10v2004-20230831-en
Behavioral task
behavioral2
Sample
vfuggEeZM.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral3
Sample
out.exe
Resource
win10v2004-20230831-en
General
-
Target
86e3e7dc9cafd72776d32eb551e0c4ee69414037480024a2667843d621860502.zip
-
Size
85KB
-
MD5
1b868e3b87969d2847f206f66a6c8925
-
SHA1
5010d0284477655c6028c3d42294b708c211f477
-
SHA256
0b66acce9c7fd66d9d91027768ce42fd1aafc0cb90c2fbef54f0e6ae0825c9cc
-
SHA512
15ab19cb54ee1a045e50de5847f7fd6f9b063c7cf97e8abc52d6a1aaa197362065ab88aad275e74109ac54a330fedfcfecfbd25700774f460a45ea14e6a7f327
-
SSDEEP
1536:beS8UJlfwJGz6LhsiM8Cq6NZ05bYbjJE5TgwWPkn7PbaDzk7DTkQsDg:Z8mf369siM8CpaYbdESw1tb7sM
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 320 svchost.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\86e3e7dc9cafd72776d32eb551e0c4ee69414037480024a2667843d621860502.zip1⤵PID:888
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2016
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:320
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD56837db697bad93964333a2505aa42247
SHA113189a8e0bb6e68460bd7cbc9b833d00f26e0d18
SHA2560347b50d323e0396ce99025d6881d5dad161949b90a81319731f3e60794f5745
SHA512d26c132724a2564c9696cdaa2b8baf056d664f641ed5b2755864c307bbbd7fc8fbd64e66dd3c35154537f2265edc20d57491b1e7722281f5943e189fa24f258e