Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 02:05

General

  • Target

    57b3cbca0429cdae651c56b1acdf3329.exe

  • Size

    212KB

  • MD5

    57b3cbca0429cdae651c56b1acdf3329

  • SHA1

    874acdd71b12c978801e1c5c0cd7b7e3e3878498

  • SHA256

    bd2f4b29a67dbe2e6f008c739ed8e73ed82e0b1dab5b2d8ed4659d8704f65067

  • SHA512

    944b29cc7fb9c1e972c376d23f33cd668cafd6179b36caf9c7f9f697a95a2ecf6fad8ae2d3697e9e2e4912211daaf6255aa02579619c9c08f2670f00eb47c2d6

  • SSDEEP

    3072:cdt6Fd/Xdc31yI51F5/rj+dotPjLUqTOa3ZPa92cKX3/m5gjXzfbWOOV7el7OJN:owPo1yOZ23u3fbWOB4

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57b3cbca0429cdae651c56b1acdf3329.exe
    "C:\Users\Admin\AppData\Local\Temp\57b3cbca0429cdae651c56b1acdf3329.exe"
    1⤵
      PID:3588
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:1852
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3656

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3588-0-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/3588-1-0x0000000000400000-0x0000000000439000-memory.dmp

        Filesize

        228KB

      • memory/3656-2-0x000001DAFCB40000-0x000001DAFCB50000-memory.dmp

        Filesize

        64KB

      • memory/3656-18-0x000001DAFCC40000-0x000001DAFCC50000-memory.dmp

        Filesize

        64KB

      • memory/3656-34-0x000001DAFCF90000-0x000001DAFCF91000-memory.dmp

        Filesize

        4KB

      • memory/3656-36-0x000001DAFCFC0000-0x000001DAFCFC1000-memory.dmp

        Filesize

        4KB

      • memory/3656-37-0x000001DAFCFC0000-0x000001DAFCFC1000-memory.dmp

        Filesize

        4KB

      • memory/3656-38-0x000001DAFD0D0000-0x000001DAFD0D1000-memory.dmp

        Filesize

        4KB