Analysis

  • max time kernel
    147s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    18-01-2024 20:17

General

  • Target

    IDA Pro/ida64.exe

  • Size

    4.0MB

  • MD5

    24ba0b4e0a3445a6c2fb866d94669f05

  • SHA1

    3b6bf89f5ec4b19266260fd488ae720a90f1865d

  • SHA256

    70840575ebddb25412f6de60329d5d395b325b709df9202411b723d0744c9624

  • SHA512

    dcbd7babaa0de562a0a6682c3c0b053c419ddc2e78d6a0213c081a5ca50a256a720d0c6cbf3b2de669a5410918dfeb2d7d4fc29b23ae3285103c8e3c2be8b2b0

  • SSDEEP

    49152:GQptxtn8v9flRURQXyczsoBR9RAzkdk9ltnv2UtxOpYjObpJWYcmD75zoELxnXAm:GitxMR4QuoBPRAzz9lRvMVtdwdZro6m

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IDA Pro\ida64.exe
    "C:\Users\Admin\AppData\Local\Temp\IDA Pro\ida64.exe"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:5556
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
    1⤵
      PID:5168
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k UnistackSvcGroup
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4856

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4856-46-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-3-0x0000023B1DC40000-0x0000023B1DC50000-memory.dmp

      Filesize

      64KB

    • memory/4856-65-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-48-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-19-0x0000023B1DD40000-0x0000023B1DD50000-memory.dmp

      Filesize

      64KB

    • memory/4856-49-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-37-0x0000023B260D0000-0x0000023B260D1000-memory.dmp

      Filesize

      4KB

    • memory/4856-38-0x0000023B260D0000-0x0000023B260D1000-memory.dmp

      Filesize

      4KB

    • memory/4856-39-0x0000023B261E0000-0x0000023B261E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-40-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-41-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-42-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-43-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-44-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-45-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-47-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-64-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-63-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-35-0x0000023B260A0000-0x0000023B260A1000-memory.dmp

      Filesize

      4KB

    • memory/4856-50-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-51-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-52-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-53-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-54-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-55-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-56-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-57-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-58-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-59-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-60-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-61-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-62-0x0000023B260E0000-0x0000023B260E1000-memory.dmp

      Filesize

      4KB

    • memory/5556-1-0x00007FF92A7B0000-0x00007FF92AD06000-memory.dmp

      Filesize

      5.3MB

    • memory/5556-0-0x00007FF78EDD0000-0x00007FF78F1CF000-memory.dmp

      Filesize

      4.0MB

    • memory/5556-2-0x0000020243730000-0x0000020243740000-memory.dmp

      Filesize

      64KB