Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
c9fc26b2c16a08e38aa8fc2264b79052.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c9fc26b2c16a08e38aa8fc2264b79052.exe
Resource
win10v2004-20240226-en
General
-
Target
c9fc26b2c16a08e38aa8fc2264b79052.exe
-
Size
1.2MB
-
MD5
c9fc26b2c16a08e38aa8fc2264b79052
-
SHA1
984297683156fa4229bda79480a83ddaf451c81c
-
SHA256
11808159d808542b4ba5fd3241a28a7733b76c7d5b5559b3efd5f3336460e364
-
SHA512
b09a8899a6337e30a928d2759a79a8eea7d0d0587344f4c318667f322ccd64da2597e2e4896cfb232db0008b0c9d9c4b03cd1f1121fb85f34ff995f356ec730e
-
SSDEEP
12288:jvlm+YpSnw4flm+YpSnw4j7hOJL+gC18BbzUlm+YpSnw4y:Llblv78JL+gWOUlu
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2456 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9fc26b2c16a08e38aa8fc2264b79052.exe"C:\Users\Admin\AppData\Local\Temp\c9fc26b2c16a08e38aa8fc2264b79052.exe"1⤵PID:372
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1376
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2456
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD50c21c605fe952cd27221bb16946233fb
SHA168aa36ff8bea674708a85d2b05e3df4daf6ec9d5
SHA25619ed317659c755607311f0470345e2e17f563361a7e9f9f55536edccfe53ab3b
SHA5128296c78dafd4e798cf358f92595a83ed72ebb8b752c446fe1b92991d30436fcad2dc0bf2eb19b78b9b77f3a9d6994fa0a9538a4d8be42ef265ba084456589f4a