Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 11:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Cor Client 1.5.exe
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Cor Client 1.5.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
Cor Client 1.5.exe
-
Size
473KB
-
MD5
e90d7c73cd6db02085b3b468c92eb670
-
SHA1
624b6c71a6749b909c33c3d009b224fb2e754831
-
SHA256
3503068db91a7db8cd0daf56dcf6973abef2b321b8cd2ac3073076e6985662d0
-
SHA512
58a11c1df504e989f029fd788ed6cfa49eda6d728db09cb131e1363e4de7afbbe5977e429e8b8d6c33243ee72b5f7e718ba5b86205aa8861184db62ff7e9b065
-
SSDEEP
12288:CBlbUPma8IJSQpQU4WbMpHwCvQA8nC4NP:sob5J7p4W/Cvr8nC4NP
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1360 Cor Client 1.5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 3004 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1360 Cor Client 1.5.exe 1360 Cor Client 1.5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cor Client 1.5.exe"C:\Users\Admin\AppData\Local\Temp\Cor Client 1.5.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1360
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:952
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3004