Resubmissions

26/12/2023, 16:22

231226-tvcexscbb9 10

24/12/2023, 13:14

231224-qgpasacabl 10

Analysis

  • max time kernel
    1721s
  • max time network
    1171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 13:14

General

  • Target

    SuperBoo-Protector-cracked-main.zip

  • Size

    2.6MB

  • MD5

    277c927bc2e7a1a8bb6c2fba0910fe19

  • SHA1

    0faa50b172942693fcf79702943a5b03cf9550e9

  • SHA256

    0adb6afe6f60b030f1447249a28677ab16b52189cbbf36cef48fed22d3ca2776

  • SHA512

    173ef5090df469611b5b744f9bdb47a9efe67d3b2807f1f84421c00bb13dbf1625af1def705519ef874e259fd8c2abcda0b6eddd86c8e77e885e840bc9a5e667

  • SSDEEP

    49152:edngwwHv5VbtHwNxR9Fl/uPugYadTKE1IEEV+FkcoJAN/bisZ8bQZyUlixtecKf:6gNhVRwvm1eOI5+FRgANDhZflqteF

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\SuperBoo-Protector-cracked-main.zip
    1⤵
      PID:2264
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:936
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4052

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

              Filesize

              16KB

              MD5

              635e4100dbf0d9875cdf3271702463e0

              SHA1

              a0eed25b95b6b3dbe54707f99b3a020b6c4b1f6c

              SHA256

              20fadb8eebe97af6bedacaa3b9452e1672f8cbe7861c500766cba7ec65b51af7

              SHA512

              745ecfeecb550a5e4816d09c58407f86954804c91f962c06fdff805b7966ffb75d7437e4bc0dc4bc5315728a10911974df86a7c54774c402f416c556abb90255

            • memory/4052-64-0x0000028E28BF0000-0x0000028E28BF1000-memory.dmp

              Filesize

              4KB

            • memory/4052-67-0x0000028E28C00000-0x0000028E28C01000-memory.dmp

              Filesize

              4KB

            • memory/4052-41-0x0000028E28EA0000-0x0000028E28EA1000-memory.dmp

              Filesize

              4KB

            • memory/4052-42-0x0000028E28EA0000-0x0000028E28EA1000-memory.dmp

              Filesize

              4KB

            • memory/4052-40-0x0000028E28EA0000-0x0000028E28EA1000-memory.dmp

              Filesize

              4KB

            • memory/4052-39-0x0000028E28EA0000-0x0000028E28EA1000-memory.dmp

              Filesize

              4KB

            • memory/4052-38-0x0000028E28EA0000-0x0000028E28EA1000-memory.dmp

              Filesize

              4KB

            • memory/4052-36-0x0000028E28EA0000-0x0000028E28EA1000-memory.dmp

              Filesize

              4KB

            • memory/4052-43-0x0000028E28AC0000-0x0000028E28AC1000-memory.dmp

              Filesize

              4KB

            • memory/4052-66-0x0000028E28C00000-0x0000028E28C01000-memory.dmp

              Filesize

              4KB

            • memory/4052-37-0x0000028E28EA0000-0x0000028E28EA1000-memory.dmp

              Filesize

              4KB

            • memory/4052-68-0x0000028E28D10000-0x0000028E28D11000-memory.dmp

              Filesize

              4KB

            • memory/4052-32-0x0000028E28E70000-0x0000028E28E71000-memory.dmp

              Filesize

              4KB

            • memory/4052-16-0x0000028E20880000-0x0000028E20890000-memory.dmp

              Filesize

              64KB

            • memory/4052-52-0x0000028E289F0000-0x0000028E289F1000-memory.dmp

              Filesize

              4KB

            • memory/4052-49-0x0000028E28AB0000-0x0000028E28AB1000-memory.dmp

              Filesize

              4KB

            • memory/4052-46-0x0000028E28AC0000-0x0000028E28AC1000-memory.dmp

              Filesize

              4KB

            • memory/4052-44-0x0000028E28AB0000-0x0000028E28AB1000-memory.dmp

              Filesize

              4KB

            • memory/4052-35-0x0000028E28EA0000-0x0000028E28EA1000-memory.dmp

              Filesize

              4KB

            • memory/4052-34-0x0000028E28EA0000-0x0000028E28EA1000-memory.dmp

              Filesize

              4KB

            • memory/4052-33-0x0000028E28EA0000-0x0000028E28EA1000-memory.dmp

              Filesize

              4KB

            • memory/4052-0-0x0000028E20780000-0x0000028E20790000-memory.dmp

              Filesize

              64KB