Analysis
-
max time kernel
92s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 18:43
Behavioral task
behavioral1
Sample
standarrev.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
standarrev.exe
Resource
win10v2004-20240226-en
General
-
Target
standarrev.exe
-
Size
6.2MB
-
MD5
e435c614dda79fdf8bfd451e493a7c03
-
SHA1
40db34d76a5e6f974c566d5a98babf7249db662f
-
SHA256
c6d2b18a7c9f532bcf6f249c411fef96ac7f881d053fc71929e92e146855b042
-
SHA512
a475c4cef776d474c7dc7f3b40ca147c32b1225462334f41db4ddb1aaca9d98f1834d726f71e7a7644e9974a7cf9bac0f4393bf33fe5fe1aa5ad78ce70ea1e0c
-
SSDEEP
196608:0cLUguWJysVYvsOgtdIQLOMIdiwgPoNB:5IWJvtaL/dqPoN
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1472 standarrev.exe 1472 standarrev.exe 1472 standarrev.exe 1472 standarrev.exe 1472 standarrev.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: 35 1472 standarrev.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1472 2156 standarrev.exe 91 PID 2156 wrote to memory of 1472 2156 standarrev.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\standarrev.exe"C:\Users\Admin\AppData\Local\Temp\standarrev.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\standarrev.exe"C:\Users\Admin\AppData\Local\Temp\standarrev.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD50e675d4a7a5b7ccd69013386793f68eb
SHA16e5821ddd8fea6681bda4448816f39984a33596b
SHA256bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1
SHA512cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66
-
Filesize
74KB
MD510cd16bb63862536570c717ffc453da4
SHA1b3ef50d7ac4652b5c35f1d86a0130fb43dd5a669
SHA256e002a1bd6fba44681d557b64d439585dba9820226e1c3da5a62628bbaa930ae3
SHA51255ee581c4005901661efaf9aad6ea39b2b2e265579539d464d62e4209638567b3b9fdd945d0bed0a1047f977d374a5707a970c621ca289077e2d6c5aeca491b1
-
Filesize
762KB
MD551d6ea80e0a4b7dcd95996bafbd4d5d8
SHA130bae7a3d819efe59850d234a706ac272266d01f
SHA256a119bf8101969d16dd84c2a115df5dc6cd43c5ebb262159bbb3175ae550b5b96
SHA5129be699cfc35d03ff5b533654a26754b1e0527b43dfcb12f6a9a40ee9fb03238f7b5075c0cd8f76727f2b3ee158c4c5d38569bcfca29493241b3ab012a30f818d
-
Filesize
3.6MB
MD5c4e99d7375888d873d2478769a8d844c
SHA1881e42ad9b7da068ee7a6d133484f9d39519ca7e
SHA25612f26beb439ddf8d56e7544b06a0675d5da6670c02f8f9cede7aad1de71eb116
SHA512a5b79a919f15cda2c295c8da923ffe5dd30408376e459669e4e376b9d4d504d43671518d7085352bb90c4ce4efc6d81c91ac6cedbdaa896f916d80f7346a695b
-
Filesize
26KB
MD539b7c056bca546778690b9922315f9ff
SHA15f62169c8de1f72db601d30b37d157478723859b
SHA2569514b4c40c35396b1952a8acf805e993a3875b37370f44ef36ed33c7151412ef
SHA512229538131d83299ea90652818c99972c1ee692c070e7fea9599420c99dd8ae75fb2367e9509aad23984fe0a8d21221a59bd57493b5cd1d6c7391c3c55d714e94
-
Filesize
1KB
MD5fcf453a12eef405affb90608081474f8
SHA118f8832a1b46225f05e69a581c6c81f322f303c8
SHA256476149e0b5e38aedcc56ca49e8b759e879655d589325a9c4135722b1714b1aaa
SHA512e3a581888f6c84777acf93bb4cdac65be89dc0333a9b076c64097af110cb05c4a02ee433cd7b86b6c8e8694352fa1c08ba4da61275f915139a4d56ea32fb06e1
-
Filesize
970KB
MD5aad2e99881765464c9ad9ccdbe78f0e0
SHA18634ce21a2683674210e836822fda448262e2e16
SHA256e6287f7ba5892c99da70e9785d320a665809ca8e657a64b9fef1e8afcfb6a2f9
SHA51268d2e898cdd73a3ad41ef3db7a149588a82629ac0628c07606f009bd6a92a62f9816c995b1794c8a957a4f3c55a72fcab17a400a2f55016a0ee8d773a172d002