Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230831-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2023 01:20

General

  • Target

    remcmdstub.exe

  • Size

    53KB

  • MD5

    fe8978aeac17836d0b99c3edb88de357

  • SHA1

    d7320274619baeb175855406d1027d02f845fb6c

  • SHA256

    577927563589c3c9d05c510bce5f3cd9a55ea1de155e50e87c066bbff290a6fe

  • SHA512

    68b6c647b40f071a602dcecd580232aca8434c7338837debda9d1ec37776415f680ac184ffb1497c93caa7353276d41d5df77538e004c1ffd168217df2cb5262

  • SSDEEP

    768:vehWO78043LHCTPQuw/T3cgCsMl2PLLW/bC:vAb43LuPQFTSl2PLaTC

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\remcmdstub.exe
    "C:\Users\Admin\AppData\Local\Temp\remcmdstub.exe"
    1⤵
      PID:412
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:4224
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4776

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4776-0-0x000002A6D7970000-0x000002A6D7980000-memory.dmp

        Filesize

        64KB

      • memory/4776-16-0x000002A6D7A70000-0x000002A6D7A80000-memory.dmp

        Filesize

        64KB

      • memory/4776-32-0x000002A6DFF60000-0x000002A6DFF61000-memory.dmp

        Filesize

        4KB

      • memory/4776-33-0x000002A6DFF90000-0x000002A6DFF91000-memory.dmp

        Filesize

        4KB

      • memory/4776-34-0x000002A6DFF90000-0x000002A6DFF91000-memory.dmp

        Filesize

        4KB

      • memory/4776-35-0x000002A6DFF90000-0x000002A6DFF91000-memory.dmp

        Filesize

        4KB

      • memory/4776-36-0x000002A6DFF90000-0x000002A6DFF91000-memory.dmp

        Filesize

        4KB

      • memory/4776-37-0x000002A6DFF90000-0x000002A6DFF91000-memory.dmp

        Filesize

        4KB

      • memory/4776-38-0x000002A6DFF90000-0x000002A6DFF91000-memory.dmp

        Filesize

        4KB

      • memory/4776-39-0x000002A6DFF90000-0x000002A6DFF91000-memory.dmp

        Filesize

        4KB

      • memory/4776-40-0x000002A6DFF90000-0x000002A6DFF91000-memory.dmp

        Filesize

        4KB

      • memory/4776-41-0x000002A6DFF90000-0x000002A6DFF91000-memory.dmp

        Filesize

        4KB

      • memory/4776-42-0x000002A6DFF90000-0x000002A6DFF91000-memory.dmp

        Filesize

        4KB

      • memory/4776-43-0x000002A6DFCB0000-0x000002A6DFCB1000-memory.dmp

        Filesize

        4KB

      • memory/4776-44-0x000002A6DFCA0000-0x000002A6DFCA1000-memory.dmp

        Filesize

        4KB

      • memory/4776-46-0x000002A6DFCB0000-0x000002A6DFCB1000-memory.dmp

        Filesize

        4KB

      • memory/4776-49-0x000002A6DFCA0000-0x000002A6DFCA1000-memory.dmp

        Filesize

        4KB

      • memory/4776-52-0x000002A6DFBE0000-0x000002A6DFBE1000-memory.dmp

        Filesize

        4KB

      • memory/4776-64-0x000002A6DFDE0000-0x000002A6DFDE1000-memory.dmp

        Filesize

        4KB

      • memory/4776-66-0x000002A6DFDF0000-0x000002A6DFDF1000-memory.dmp

        Filesize

        4KB

      • memory/4776-67-0x000002A6DFDF0000-0x000002A6DFDF1000-memory.dmp

        Filesize

        4KB

      • memory/4776-68-0x000002A6DFF00000-0x000002A6DFF01000-memory.dmp

        Filesize

        4KB