Overview
overview
10Static
static
10HMC.zip
windows10-2004-x64
1DotNetZip.dll
windows10-2004-x64
1Hackus.exe
windows10-2004-x64
10HandyControl.dll
windows10-2004-x64
1MailBee.NET.dll
windows10-2004-x64
1Newtonsoft.Json.dll
windows10-2004-x64
1System.Dat...te.dll
windows10-2004-x64
1System.Win...on.dll
windows10-2004-x64
1ToolGood.Words.dll
windows10-2004-x64
1x64/GoSrp.dll
windows10-2004-x64
1x64/SQLite...op.dll
windows10-2004-x64
1x86/GoSrp.dll
windows10-2004-x64
1x86/SQLite...op.dll
windows10-2004-x64
3xNet.dll
windows10-2004-x64
1Analysis
-
max time kernel
573s -
max time network
514s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 01:38
Behavioral task
behavioral1
Sample
HMC.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
DotNetZip.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Hackus.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
HandyControl.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
MailBee.NET.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
System.Data.SQLite.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
System.Windows.Controls.Ribbon.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
ToolGood.Words.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
x64/GoSrp.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
x64/SQLite.Interop.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
x86/GoSrp.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
x86/SQLite.Interop.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
xNet.dll
Resource
win10v2004-20240226-en
General
-
Target
MailBee.NET.dll
-
Size
1.7MB
-
MD5
6dde77d756621d00016945736760f717
-
SHA1
7094f0dea1b4c4bfd7f840b63b704dfc9bdd079f
-
SHA256
81632ee251474cb656dce412181e9f68f426ba20f3a0c4120c868a0cf05cd6d0
-
SHA512
e3389201e9d198be6304b79559d9d5d457cb33c74b441afb7ecafe4aaafb3cb0d583cd4ab8a5eb6045cd934d2c2a4007f6d1474beb5584585fcaae0060f4b813
-
SSDEEP
24576:sDMgcE4ilhMM9XBav0OvQRk/9P7miD6MaP7N:sDMgcWfMM9XBQ0OvRmiW17
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2332 svchost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\MailBee.NET.dll,#11⤵PID:4036
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3876
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2332