Analysis
-
max time kernel
98s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 23:17
Static task
static1
Behavioral task
behavioral1
Sample
42b21bfbf8431838e0dfbfb11d12303e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
42b21bfbf8431838e0dfbfb11d12303e.exe
Resource
win10v2004-20231222-en
General
-
Target
42b21bfbf8431838e0dfbfb11d12303e.exe
-
Size
99KB
-
MD5
42b21bfbf8431838e0dfbfb11d12303e
-
SHA1
8a3d02ebba79e4771be41715774982d2066ddf95
-
SHA256
e0f726829012f452927945a5a3e655ce7617b3cd14881ec053fedab7c5b18b73
-
SHA512
19a55421a3a882f450df0f454848775dc7f2cca3226caf4422291fedd075f70f026544a4a621d4217118f9963905d72d0a3c90bb5477c506bebc157a618a5d1e
-
SSDEEP
3072:qP11uG6DyU0wLlRy646Tx7JPWCiw1fX0p:k1r6D10wLanox1PNMp
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3252 42b21bfbf8431838e0dfbfb11d12303e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4924 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4924 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\42b21bfbf8431838e0dfbfb11d12303e.exe"C:\Users\Admin\AppData\Local\Temp\42b21bfbf8431838e0dfbfb11d12303e.exe"1⤵
- Loads dropped DLL
PID:3252
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x304 0x3001⤵
- Suspicious use of AdjustPrivilegeToken
PID:4924
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5780d14604d49e3c634200c523def8351
SHA1e208ef6f421d2260070a9222f1f918f1de0a8eeb
SHA256844eb66a10b848d3a71a8c63c35f0a01550a46d2ff8503e2ca8947978b03b4d2
SHA512a49c030f11da8f0cdc4205c86bec00653ec2f8899983cad9d7195fd23255439291aaec5a7e128e1a103efd93b8566e86f15af89eba4efebf9debce14a7a5564b