Resubmissions
14/03/2024, 06:28
240314-g8jpyafa33 114/03/2024, 06:16
240314-g1fy3seg73 114/03/2024, 06:07
240314-gvqw4aef52 1Analysis
-
max time kernel
63s -
max time network
48s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/03/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
ssk.zip
Resource
win11-20240221-en
1 signatures
150 seconds
General
-
Target
ssk.zip
-
Size
122B
-
MD5
e3a34563464977670da4c7d1b119347c
-
SHA1
25b485c67453d7c2477cd5c3f591280fcdd58584
-
SHA256
731fe98c7bfbc18e553f193d60a08ccb967906e2f36959b6b7588f6eb08c5aa9
-
SHA512
ad17be6f5e448ec9b6b66495e479731f91c0e1ff28d76cd36b15a4f38f1b5dec99d101e085eb6dfcb1623acd298b9836b1d631455b7d1b6ecc095590db9856e4
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeBackupPrivilege 3780 svchost.exe Token: SeRestorePrivilege 3780 svchost.exe Token: SeSecurityPrivilege 3780 svchost.exe Token: SeTakeOwnershipPrivilege 3780 svchost.exe Token: 35 3780 svchost.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\ssk.zip1⤵PID:2080
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3580
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3780