Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 10:53
Static task
static1
Behavioral task
behavioral1
Sample
cb389a86e52dbef0863b64753bf6ac73.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb389a86e52dbef0863b64753bf6ac73.exe
Resource
win10v2004-20240226-en
General
-
Target
cb389a86e52dbef0863b64753bf6ac73.exe
-
Size
192KB
-
MD5
cb389a86e52dbef0863b64753bf6ac73
-
SHA1
fb32bca8c9301cf2f0ba5fb5c56b846f1711ad88
-
SHA256
71567d075aa5a0b686c06880bc6eabdef417657ba34318305da2954e5c3c842d
-
SHA512
f5e730aadb7b3998211983dcd7c7cb5d88efd894d004bf247636bd99aa24f1a4c5f4c0aedac4c3d5887e54a3add98a22ed3c3d0c54e4f71cb2c5a6f3ed7ab1d5
-
SSDEEP
3072:g3ZTwCVqkdfrZ9LrChwQYasOXMM7MsP0vE5zIYbcFCyCYmEneywv4irbgg2nQ1d:g3ZTXVqo1JHQYaMM71P0vE5zIYcFCyTK
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1972 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb389a86e52dbef0863b64753bf6ac73.exe"C:\Users\Admin\AppData\Local\Temp\cb389a86e52dbef0863b64753bf6ac73.exe"1⤵PID:4388
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:412
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1972
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5ad3244ac0e3269ef276054e3a9a8ec82
SHA1c63200c503ede2c9f37d823e55311252b2056cb7
SHA256f9d1f61245efa3c5ebf7ac5b0d458e8a016bca2989149ed8eeecd2787b44a7f9
SHA5127ad04263c83d2ceb109d15ec4391ff5affe3dc012536af23ccd3feea32cebeb4046e0990e1e1ae57bc2115c8fa16f4c07600c824045df90bdbe0f9941eabfca4