Overview
overview
3Static
static
3capstone.dll
windows7-x64
1capstone.dll
windows10-2004-x64
3csgo-x86.dll
windows7-x64
1csgo-x86.dll
windows10-2004-x64
1csgo-x86.map
windows7-x64
3csgo-x86.map
windows10-2004-x64
3devldr
windows7-x64
1devldr
windows10-2004-x64
1devldr.exe
windows7-x64
1devldr.exe
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
capstone.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
capstone.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
csgo-x86.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
csgo-x86.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
csgo-x86.map
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
csgo-x86.map
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
devldr
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
devldr
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
devldr.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
devldr.exe
Resource
win10v2004-20240226-en
General
-
Target
devldr
-
Size
1KB
-
MD5
bca1b0fa2b2cb4a8d150194dd1608a5b
-
SHA1
4ce56eb160bf869af4844ab3c4768446e0c2ff11
-
SHA256
1d387fd7477bb59c22f5e9b55351fb506a44adaf4f6f1b5711c8f4d0682a177e
-
SHA512
d1044c0c71ec47081c7c0ef80369d702e22e763593f9f775b040cd5a572a029accc429fe08be798d9395fe4316f0882ef38855e40e1ddf04e4c47dffcbfab722
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2984 devldr.exe 2984 devldr.exe 2984 devldr.exe 2984 devldr.exe 2984 devldr.exe 2984 devldr.exe 2984 devldr.exe 2984 devldr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2984 devldr.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4640 wrote to memory of 2984 4640 cmd.exe 89 PID 4640 wrote to memory of 2984 4640 cmd.exe 89 PID 4640 wrote to memory of 2984 4640 cmd.exe 89
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\devldr1⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\devldr.exeC:\Users\Admin\AppData\Local\Temp\devldr2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-