Analysis
-
max time kernel
133s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
642a3973cd68fb8b154153f51a04a94d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
642a3973cd68fb8b154153f51a04a94d.exe
Resource
win10v2004-20231222-en
General
-
Target
642a3973cd68fb8b154153f51a04a94d.exe
-
Size
778KB
-
MD5
642a3973cd68fb8b154153f51a04a94d
-
SHA1
c4ec5065bdc44de32ca065835f679f211d130566
-
SHA256
21cb27bac2b9299249a508a50586814a56c632088b95baa91b02592d868adbc6
-
SHA512
e757fe455a5d4b83c9edf0b265b56540e42bd24f6c122a0e86028eaa51a8dae804e4bdc90bec70e53f06624c9203fb3a3b9ef27b6a7e16a74b86b6d9d607a7b8
-
SSDEEP
24576:ViFPxWXwq38PUR1y7IncWZrsqo557m7raH:VgPk+UR1PcS6r7z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2396 642a3973cd68fb8b154153f51a04a94d.tmp -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2520 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1464 wrote to memory of 2396 1464 642a3973cd68fb8b154153f51a04a94d.exe 88 PID 1464 wrote to memory of 2396 1464 642a3973cd68fb8b154153f51a04a94d.exe 88 PID 1464 wrote to memory of 2396 1464 642a3973cd68fb8b154153f51a04a94d.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\642a3973cd68fb8b154153f51a04a94d.exe"C:\Users\Admin\AppData\Local\Temp\642a3973cd68fb8b154153f51a04a94d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\is-IR8UB.tmp\642a3973cd68fb8b154153f51a04a94d.tmp"C:\Users\Admin\AppData\Local\Temp\is-IR8UB.tmp\642a3973cd68fb8b154153f51a04a94d.tmp" /SL5="$80064,758190,81408,C:\Users\Admin\AppData\Local\Temp\642a3973cd68fb8b154153f51a04a94d.exe"2⤵
- Executes dropped EXE
PID:2396
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4428
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2520
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD57ac46d465fcc339c548a1d5650deccb0
SHA17bb3b764f5ce0d7e8ec84611e7a4f94c16da96ba
SHA256901136442409b355d2c6eacc8b689419102f17040b2e1a78381159104dfe284b
SHA51253db1cd9f05d17f5df6be4b82e27c2f3506b967b72123b06be6f7e85c64d203abff29fd12d2e62fdf20dccc0b997b9c10238ec54ec77a69a92ff25b54e538715