Resubmissions

12/01/2024, 22:35

240112-2h3eksfhe5 1

12/01/2024, 22:32

240112-2f772sfha5 1

Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2024, 22:32

General

  • Target

    acrotray.exe

  • Size

    6.4MB

  • MD5

    efc8f22e29a240e60e03b27fe6ad25a0

  • SHA1

    af72f361b2c04473cb02fee83568bfa1f193efd0

  • SHA256

    5d67d86afba4bf6a71f1449af89e2da5c491d73d1a06e105adbfb29268e2dbc8

  • SHA512

    0aa4c8254876a0523ca0074ab9cb5e947021b49d15b771941770571ed53178c3cb7ad110f93f3d9dadae9cd8c650c1c3c4fcca4f8a5468629dfdfe82a1bd777c

  • SSDEEP

    196608:oWvzX0vR1ZyT0O8zC2T7aZPOZCupldPmtWutLB:zvzEH0POZYWutt

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acrotray.exe
    "C:\Users\Admin\AppData\Local\Temp\acrotray.exe"
    1⤵
      PID:3608
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:208
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1432

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1432-16-0x000001DEA9940000-0x000001DEA9950000-memory.dmp

        Filesize

        64KB

      • memory/1432-0-0x000001DEA9840000-0x000001DEA9850000-memory.dmp

        Filesize

        64KB

      • memory/1432-36-0x000001DEB1DD0000-0x000001DEB1DD1000-memory.dmp

        Filesize

        4KB

      • memory/1432-35-0x000001DEB1CC0000-0x000001DEB1CC1000-memory.dmp

        Filesize

        4KB

      • memory/1432-34-0x000001DEB1CC0000-0x000001DEB1CC1000-memory.dmp

        Filesize

        4KB

      • memory/1432-32-0x000001DEB1C90000-0x000001DEB1C91000-memory.dmp

        Filesize

        4KB