Overview
overview
3Static
static
1Five-Night....3.zip
windows7-x64
1Five-Night....3.zip
windows10-2004-x64
1base.apk
android-9-x86
1base.apk
android-10-x64
1base.apk
android-11-x64
10GJr3U3vU5NtL977
windows7-x64
10GJr3U3vU5NtL977
windows10-2004-x64
138bggO91n750RahR
windows7-x64
138bggO91n750RahR
windows10-2004-x64
1AjG78Wvri8FppoVD
windows7-x64
1AjG78Wvri8FppoVD
windows10-2004-x64
1HXH5EUBoXAE2Cvcw
windows7-x64
1HXH5EUBoXAE2Cvcw
windows10-2004-x64
1KCZRmzZoaQN3yvb9
windows7-x64
1KCZRmzZoaQN3yvb9
windows10-2004-x64
1MTMo8orhvqS5CNUm
windows7-x64
1MTMo8orhvqS5CNUm
windows10-2004-x64
1Mke1F52D8MOnAE6L
windows7-x64
1Mke1F52D8MOnAE6L
windows10-2004-x64
1PIdvFDD4Wtyr0mGo
windows7-x64
1PIdvFDD4Wtyr0mGo
windows10-2004-x64
1a3e0EaC19HMbDQMm
windows7-x64
1a3e0EaC19HMbDQMm
windows10-2004-x64
1kMIDNKxacjT6JIO6
windows7-x64
1kMIDNKxacjT6JIO6
windows10-2004-x64
1lVqUDL8fSDGZuf2h
windows7-x64
1lVqUDL8fSDGZuf2h
windows10-2004-x64
1icon.png
windows7-x64
3icon.png
windows10-2004-x64
3meta.sai_v1.json
windows7-x64
3meta.sai_v1.json
windows10-2004-x64
3meta.sai_v2.json
windows7-x64
3Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2023 20:20
Static task
static1
Behavioral task
behavioral1
Sample
Five-Nights-at-Freddys-2.0.3.zip
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Five-Nights-at-Freddys-2.0.3.zip
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
base.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral5
Sample
base.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral6
Sample
0GJr3U3vU5NtL977
Resource
win7-20231023-en
Behavioral task
behavioral7
Sample
0GJr3U3vU5NtL977
Resource
win10v2004-20231020-en
Behavioral task
behavioral8
Sample
38bggO91n750RahR
Resource
win7-20231020-en
Behavioral task
behavioral9
Sample
38bggO91n750RahR
Resource
win10v2004-20231023-en
Behavioral task
behavioral10
Sample
AjG78Wvri8FppoVD
Resource
win7-20231020-en
Behavioral task
behavioral11
Sample
AjG78Wvri8FppoVD
Resource
win10v2004-20231023-en
Behavioral task
behavioral12
Sample
HXH5EUBoXAE2Cvcw
Resource
win7-20231023-en
Behavioral task
behavioral13
Sample
HXH5EUBoXAE2Cvcw
Resource
win10v2004-20231020-en
Behavioral task
behavioral14
Sample
KCZRmzZoaQN3yvb9
Resource
win7-20231020-en
Behavioral task
behavioral15
Sample
KCZRmzZoaQN3yvb9
Resource
win10v2004-20231020-en
Behavioral task
behavioral16
Sample
MTMo8orhvqS5CNUm
Resource
win7-20231025-en
Behavioral task
behavioral17
Sample
MTMo8orhvqS5CNUm
Resource
win10v2004-20231023-en
Behavioral task
behavioral18
Sample
Mke1F52D8MOnAE6L
Resource
win7-20231020-en
Behavioral task
behavioral19
Sample
Mke1F52D8MOnAE6L
Resource
win10v2004-20231020-en
Behavioral task
behavioral20
Sample
PIdvFDD4Wtyr0mGo
Resource
win7-20231023-en
Behavioral task
behavioral21
Sample
PIdvFDD4Wtyr0mGo
Resource
win10v2004-20231020-en
Behavioral task
behavioral22
Sample
a3e0EaC19HMbDQMm
Resource
win7-20231023-en
Behavioral task
behavioral23
Sample
a3e0EaC19HMbDQMm
Resource
win10v2004-20231025-en
Behavioral task
behavioral24
Sample
kMIDNKxacjT6JIO6
Resource
win7-20231023-en
Behavioral task
behavioral25
Sample
kMIDNKxacjT6JIO6
Resource
win10v2004-20231023-en
Behavioral task
behavioral26
Sample
lVqUDL8fSDGZuf2h
Resource
win7-20231020-en
Behavioral task
behavioral27
Sample
lVqUDL8fSDGZuf2h
Resource
win10v2004-20231020-en
Behavioral task
behavioral28
Sample
icon.png
Resource
win7-20231025-en
Behavioral task
behavioral29
Sample
icon.png
Resource
win10v2004-20231023-en
Behavioral task
behavioral30
Sample
meta.sai_v1.json
Resource
win7-20231020-en
Behavioral task
behavioral31
Sample
meta.sai_v1.json
Resource
win10v2004-20231023-en
Behavioral task
behavioral32
Sample
meta.sai_v2.json
Resource
win7-20231023-en
General
-
Target
Mke1F52D8MOnAE6L
-
Size
24KB
-
MD5
e1681b946e808071f1c8dcd49c2ff706
-
SHA1
6288aa2ba11840a5532fee615b7af84fe9249eaa
-
SHA256
bf36f8c9c293a20734e15221d730f129ab91725c5a92612c9e56fe1bdcb83d6a
-
SHA512
aaa37375a82829a9769692c67da1d584fda076eb636f6ab77639e447a50b1ba491f6c44c63f7d39c20d155dda9edf95fe389f8a26ec2c3333abbf32fd0d0eb8d
-
SSDEEP
768:oajIbubYjn5Y1X4VG/8c2ZRZXtAyPmjYM8l:hI6EK1XLK/Vmjv4
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2212 svchost.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Mke1F52D8MOnAE6L1⤵PID:1812
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2968
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2212