Overview
overview
3Static
static
1Five-Night....3.zip
windows7-x64
1Five-Night....3.zip
windows10-2004-x64
1base.apk
android-9-x86
1base.apk
android-10-x64
1base.apk
android-11-x64
10GJr3U3vU5NtL977
windows7-x64
10GJr3U3vU5NtL977
windows10-2004-x64
138bggO91n750RahR
windows7-x64
138bggO91n750RahR
windows10-2004-x64
1AjG78Wvri8FppoVD
windows7-x64
1AjG78Wvri8FppoVD
windows10-2004-x64
1HXH5EUBoXAE2Cvcw
windows7-x64
1HXH5EUBoXAE2Cvcw
windows10-2004-x64
1KCZRmzZoaQN3yvb9
windows7-x64
1KCZRmzZoaQN3yvb9
windows10-2004-x64
1MTMo8orhvqS5CNUm
windows7-x64
1MTMo8orhvqS5CNUm
windows10-2004-x64
1Mke1F52D8MOnAE6L
windows7-x64
1Mke1F52D8MOnAE6L
windows10-2004-x64
1PIdvFDD4Wtyr0mGo
windows7-x64
1PIdvFDD4Wtyr0mGo
windows10-2004-x64
1a3e0EaC19HMbDQMm
windows7-x64
1a3e0EaC19HMbDQMm
windows10-2004-x64
1kMIDNKxacjT6JIO6
windows7-x64
1kMIDNKxacjT6JIO6
windows10-2004-x64
1lVqUDL8fSDGZuf2h
windows7-x64
1lVqUDL8fSDGZuf2h
windows10-2004-x64
1icon.png
windows7-x64
3icon.png
windows10-2004-x64
3meta.sai_v1.json
windows7-x64
3meta.sai_v1.json
windows10-2004-x64
3meta.sai_v2.json
windows7-x64
3Analysis
-
max time kernel
148s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2023 20:20
Static task
static1
Behavioral task
behavioral1
Sample
Five-Nights-at-Freddys-2.0.3.zip
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Five-Nights-at-Freddys-2.0.3.zip
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
base.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral5
Sample
base.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral6
Sample
0GJr3U3vU5NtL977
Resource
win7-20231023-en
Behavioral task
behavioral7
Sample
0GJr3U3vU5NtL977
Resource
win10v2004-20231020-en
Behavioral task
behavioral8
Sample
38bggO91n750RahR
Resource
win7-20231020-en
Behavioral task
behavioral9
Sample
38bggO91n750RahR
Resource
win10v2004-20231023-en
Behavioral task
behavioral10
Sample
AjG78Wvri8FppoVD
Resource
win7-20231020-en
Behavioral task
behavioral11
Sample
AjG78Wvri8FppoVD
Resource
win10v2004-20231023-en
Behavioral task
behavioral12
Sample
HXH5EUBoXAE2Cvcw
Resource
win7-20231023-en
Behavioral task
behavioral13
Sample
HXH5EUBoXAE2Cvcw
Resource
win10v2004-20231020-en
Behavioral task
behavioral14
Sample
KCZRmzZoaQN3yvb9
Resource
win7-20231020-en
Behavioral task
behavioral15
Sample
KCZRmzZoaQN3yvb9
Resource
win10v2004-20231020-en
Behavioral task
behavioral16
Sample
MTMo8orhvqS5CNUm
Resource
win7-20231025-en
Behavioral task
behavioral17
Sample
MTMo8orhvqS5CNUm
Resource
win10v2004-20231023-en
Behavioral task
behavioral18
Sample
Mke1F52D8MOnAE6L
Resource
win7-20231020-en
Behavioral task
behavioral19
Sample
Mke1F52D8MOnAE6L
Resource
win10v2004-20231020-en
Behavioral task
behavioral20
Sample
PIdvFDD4Wtyr0mGo
Resource
win7-20231023-en
Behavioral task
behavioral21
Sample
PIdvFDD4Wtyr0mGo
Resource
win10v2004-20231020-en
Behavioral task
behavioral22
Sample
a3e0EaC19HMbDQMm
Resource
win7-20231023-en
Behavioral task
behavioral23
Sample
a3e0EaC19HMbDQMm
Resource
win10v2004-20231025-en
Behavioral task
behavioral24
Sample
kMIDNKxacjT6JIO6
Resource
win7-20231023-en
Behavioral task
behavioral25
Sample
kMIDNKxacjT6JIO6
Resource
win10v2004-20231023-en
Behavioral task
behavioral26
Sample
lVqUDL8fSDGZuf2h
Resource
win7-20231020-en
Behavioral task
behavioral27
Sample
lVqUDL8fSDGZuf2h
Resource
win10v2004-20231020-en
Behavioral task
behavioral28
Sample
icon.png
Resource
win7-20231025-en
Behavioral task
behavioral29
Sample
icon.png
Resource
win10v2004-20231023-en
Behavioral task
behavioral30
Sample
meta.sai_v1.json
Resource
win7-20231020-en
Behavioral task
behavioral31
Sample
meta.sai_v1.json
Resource
win10v2004-20231023-en
Behavioral task
behavioral32
Sample
meta.sai_v2.json
Resource
win7-20231023-en
General
-
Target
kMIDNKxacjT6JIO6
-
Size
35KB
-
MD5
38bc3676ad82aaa1fc535c05967703bc
-
SHA1
ac10de2229566c1521e2338bdc2a39cd772f3f18
-
SHA256
89eb6fa733fafa6a042099a9b9356b100a7555c4c84c939cbafef6ddc62126a7
-
SHA512
97dbf93e5efc528e90fd746c4980cde621a550ee9aa628480673e9d5639db03d2820693b73bed723fa51b2acab848328c8e7418d34eebd41fb83e8dee2aeb745
-
SSDEEP
768:nMXm2VuBfMawaxYMXQ6634dmEDJyhFeO1JOdwKsW1fEXUiY6PAmwYtLsRE5Oy2:MXTsVCF6mEdjq4Hn1sXJlom/LAy2
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2064 svchost.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\kMIDNKxacjT6JIO61⤵PID:1692
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2564
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2064
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5a83c197e432564f9541628ba3eada283
SHA1586e79d34b70d08edd952b399c6a08995279708f
SHA25634f5b9d93e8dcb5bac17aa110a9a9f1a69c2cf9aa55bd4cef6169e0f93a39a21
SHA5120fdb71e0d3648d7de3384cef490a6f68b83624e265c798fe9a26b1a6b5b9965d493835db43f1c33885bfbbee3a4c1fccf027ef5c935c97a4e6c61709015823ba