Resubmissions

20/02/2024, 17:05

240220-vlw9eabh8y 1

20/02/2024, 17:02

240220-vj6p3acd93 8

20/02/2024, 16:53

240220-vedtgsbg5s 1

Analysis

  • max time kernel
    137s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 17:05

General

  • Target

    SpyHunter-Installer.exe

  • Size

    6.9MB

  • MD5

    91205adee79859b7e4bf800aee7ba748

  • SHA1

    7a91f48b5527b08ddd43297fce9e83247af817fb

  • SHA256

    e970685b0dc7e9b8e44396cc04a7a7a9cef5cd2e297059543e5738b2950c2683

  • SHA512

    12fa87438fc4501e2c36f7bf084173052072a64f69b6dbfc8b296e97f0a105dcba65cd3ec565f64dc38ba3ebce1778b2d448816f32f2c11a16aca4e00ea69a00

  • SSDEEP

    98304:JruMv+uP00//6XN7c9y7w6y9GsYEEqwQt1H9G6P8BFswuzEk1c2bAbrZPbhHie:J3GuP0m69I6DQt1HZPAuzduV9Hie

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SpyHunter-Installer.exe
    "C:\Users\Admin\AppData\Local\Temp\SpyHunter-Installer.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4072
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4064

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads