Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 11:01
Behavioral task
behavioral1
Sample
fbbbbaa5ca3938d66df1f065340b051421a7135472e122e1509518c194ae8399.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fbbbbaa5ca3938d66df1f065340b051421a7135472e122e1509518c194ae8399.exe
Resource
win10v2004-20230915-en
General
-
Target
fbbbbaa5ca3938d66df1f065340b051421a7135472e122e1509518c194ae8399.exe
-
Size
838KB
-
MD5
0c6e56008c59a8cd740172cfba9b77d0
-
SHA1
b92f5d6372f6523516e0a22135392be8867be82f
-
SHA256
fbbbbaa5ca3938d66df1f065340b051421a7135472e122e1509518c194ae8399
-
SHA512
c3d72c8b2ba9a866247abab1f53719956a112348128f7839040fa14eaf7fd2b2ee7a90edd9908a064c1d9409453140cedf812ac408578d50bf77ea6650e1d965
-
SSDEEP
24576:K7R/wU5+e+Cnaar9YIzfuiD7SwfMK3wUb:k/wQ+ema+Ia8WwfMXUb
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1772 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 432 fbbbbaa5ca3938d66df1f065340b051421a7135472e122e1509518c194ae8399.exe 432 fbbbbaa5ca3938d66df1f065340b051421a7135472e122e1509518c194ae8399.exe 432 fbbbbaa5ca3938d66df1f065340b051421a7135472e122e1509518c194ae8399.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbbbbaa5ca3938d66df1f065340b051421a7135472e122e1509518c194ae8399.exe"C:\Users\Admin\AppData\Local\Temp\fbbbbaa5ca3938d66df1f065340b051421a7135472e122e1509518c194ae8399.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:432
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5a90a0f43e83b21213610c5a3afe21aef
SHA19b9728f29ff20e2e70c72177e1f684be21b0caa7
SHA256fba15e85fe9fc7f5346a9756f8f8b89ed4648cea01482d1d27448a4acbbbfbd9
SHA5129463d437d019e3afba854f5bff85aac9ab37b1a5c10fd0411676504a1f32db1fefc6a5d36081de5eaaa891417682b7d8b3cdd643f1fff4329aae95c35c42ba0a