Analysis

  • max time kernel
    149s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-02-2024 18:01

General

  • Target

    Stand.Launchpad.exe

  • Size

    73KB

  • MD5

    f372fcbce87be20833fd4acfd293cef9

  • SHA1

    56a947b3a75f2630dbf945e92a45d3bb92f10005

  • SHA256

    51c1241870f14b654b089c270af03a0176f1ab4d039de955c1cec169cb1e83a5

  • SHA512

    96e8a701fd41f7dbeb4bc625c8e1afa7398e3d838082e2ef2862911f8eebc0c3d4bcd0ddbd4130d36a7ab2b4ea53f04a95c10447291b128906b77a95c2753339

  • SSDEEP

    768:ei09avh9tuA+NDqHZIbmndydfg1dZrgkwdefeQIc5tul5scYhb:P9ztiNWIbmnv1dZrgr0Dyl5scmb

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad.exe
    "C:\Users\Admin\AppData\Local\Temp\Stand.Launchpad.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1176

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1176-0-0x00000183E77A0000-0x00000183E77B6000-memory.dmp

    Filesize

    88KB

  • memory/1176-1-0x00007FFF83C70000-0x00007FFF84731000-memory.dmp

    Filesize

    10.8MB

  • memory/1176-2-0x00000183E9C20000-0x00000183E9C30000-memory.dmp

    Filesize

    64KB

  • memory/1176-5-0x00000183E9C20000-0x00000183E9C30000-memory.dmp

    Filesize

    64KB

  • memory/1176-6-0x00000183E9C20000-0x00000183E9C30000-memory.dmp

    Filesize

    64KB

  • memory/1176-9-0x00007FFF83C70000-0x00007FFF84731000-memory.dmp

    Filesize

    10.8MB

  • memory/1176-10-0x00000183E9C20000-0x00000183E9C30000-memory.dmp

    Filesize

    64KB

  • memory/1176-11-0x00000183E9C20000-0x00000183E9C30000-memory.dmp

    Filesize

    64KB

  • memory/1176-12-0x00000183E9C20000-0x00000183E9C30000-memory.dmp

    Filesize

    64KB