Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 16:05
Static task
static1
1 signatures
4 signatures
150 seconds
General
-
Target
-
Size
1.9MB
-
MD5
faa6cb3e816adaeaabf2930457c79c33
-
SHA1
6539de41b48d271bf4237e6eb09b0ee40f9a2140
-
SHA256
6680317e6eaa04315b47aaadd986262cd485c8a4bd843902f4c779c858a3e31b
-
SHA512
58859556771203d736ee991b651a6a409de7e3059c2afe81d4545864295c383f75cfbabf3cffaa0c412a6ec27bf939f0893c28152f53512c7885e597db8d2c66
-
SSDEEP
49152:BJYNTm38/S+CqxM29DSF2WNjvOtEnqxVJMSNF8ZfK7bn:fKmMa+C0xsWgfUsfo
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 5112 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5112 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2164 [email protected] 2164 [email protected] 2164 [email protected] 2164 [email protected] 2164 [email protected] -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2164 [email protected]
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2164
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x150 0x4541⤵
- Suspicious use of AdjustPrivilegeToken
PID:5112