Analysis
-
max time kernel
77s -
max time network
33s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-02-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
lastactivityview.zip
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
LastActivityView.chm
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
LastActivityView.exe
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
readme.txt
Resource
win11-20240221-en
General
-
Target
LastActivityView.exe
-
Size
130KB
-
MD5
f27a284ef9b018cdd2a98a7b78ccdcb3
-
SHA1
67e260b11e6227c18cae8925b4f6899103c607f2
-
SHA256
af86dc3f76d39b67b967a3b714e9e70ed43eec8d3871e9691cb45d84372b53fb
-
SHA512
9a8811f13517748539308a70933b126a3348407f397bf30f903019379f927532c64015853b94acf21bdbc554d638a0265d4394d026e289103db06fe93fe5524b
-
SSDEEP
3072:5e69eWHZXp1nPDhhloZqX6EsSiEF4Gw1aqL1p7BZ5CJ/:5e/+1nrhPKqX6EsS94H8B
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2268 LastActivityView.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeBackupPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeBackupPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeBackupPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe Token: SeSecurityPrivilege 2268 LastActivityView.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LastActivityView.exe"C:\Users\Admin\AppData\Local\Temp\LastActivityView.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598B
MD53af343c935deb11820185df008e614a3
SHA1a612cc6c9dd8a11c6929e48e9cc88b146db5f1bc
SHA25638232275448a197f456c82912e73022018b631f648425f3b1cc43c417910e7f5
SHA51262ba74eb7490f7ddddab990c7aff6dbc2b01b67602f50767bebc60e511aa06a87a3cdb3476e4ffd448325f07c3a3510908c22078bb4ae69df983e24029dc0258