Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2023 20:29
Static task
static1
Behavioral task
behavioral1
Sample
ProgramaciĆ³n de Webinars Gratuitos en diciembre.eml
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ProgramaciĆ³n de Webinars Gratuitos en diciembre.eml
Resource
win10v2004-20231127-en
Behavioral task
behavioral3
Sample
email-html-2.html
Resource
win7-20231130-en
Behavioral task
behavioral4
Sample
email-html-2.html
Resource
win10v2004-20231127-en
Behavioral task
behavioral5
Sample
email-plain-1.txt
Resource
win7-20231130-en
Behavioral task
behavioral6
Sample
email-plain-1.txt
Resource
win10v2004-20231127-en
General
-
Target
email-plain-1.txt
-
Size
5KB
-
MD5
652bca6b8f22954a23e56633a91f53d2
-
SHA1
1bc08b4c5c85d792adaa83cb46249b43c662328c
-
SHA256
f99626c0d5a5fef1dc359030e1643756fd9224a3a125e6892b2b21dd4cd1c247
-
SHA512
da92d5e608bd28a44582fe71488a1cb358ec4b942782477c180a019af758af2ad183c08a24a038f290b7f09e6c54b838ff6538d130b861cd24ba6444a5e37435
-
SSDEEP
48:N02y0WfbdcHFDv7PiQFme3NQFrVIf9bOMRIFQhxsmvdMUuAX8X3J:N02yHCBPDMDSFMW25
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2192 svchost.exe
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\email-plain-1.txt1⤵PID:1096
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4280
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2192
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5a33c2e2adea2cb65f3cdd745f4321f01
SHA1e53b18cf79c25619a73fcc467a2f62644d1f050d
SHA2568c7162f38bbccb4ee546271fea2767525036e75300fb00754dfcd8b63ed3155c
SHA512a6aa22adad442c64944f8f7722102c3d26343d77fbcb57095c597a079505cbf2af27ae0b01a923defcfeb092152d39eb709612a15eb0ca4aca7edf0c70fa37d8