Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
5650b454063ee115c22f9eb94587e24e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5650b454063ee115c22f9eb94587e24e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/downloadmr.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/downloadmr.exe
Resource
win10v2004-20231215-en
General
-
Target
$PLUGINSDIR/downloadmr.exe
-
Size
122KB
-
MD5
da254a8488b60244654e1cf4d6796cf8
-
SHA1
23d06f4589786652a3a226b5012a5520a3d03452
-
SHA256
6d3b82a7ad74a1e88ae4d0f9176082130f1558fb3ff42a8b45ca8b80445efc2d
-
SHA512
d311f90ad65441f6c7ae55220c2c3f117aa7601d083e6847e1b58b96c3c332d68a25d445310818396dc88678fb9ec5356f35a04a392c3d23746a2231e14b0a2e
-
SSDEEP
1536:QaVwX9UxiLc97S3K1o/cVeGKNJIWLg49cbjXzMomH5wvtNIzNqe:QaVk9Ook231GKHICRIpmHGMNqe
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4500 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\downloadmr.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\downloadmr.exe"1⤵PID:3568
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:5084
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4500
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD53e948a23748ee8d04b6e6b28968ea623
SHA1d91a4027d36f30dd5893dc7a7f3022ecc7730ef3
SHA256f92a97853c4098225ae4e74a817920e1e7e691bdc1a572ad3761bf90637297f3
SHA512f7cb19a5e507e08ad502487db5c5c1271cc55ed0c66edb7ed46436645fe28cf7ab5d0b67b113f7257f66d002efa128179aadee23a89216a60841fb02a3ab2d9b