Analysis
-
max time kernel
156s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/03/2024, 09:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cdb1d6695e80f1876ee833ec0186db1d.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
cdb1d6695e80f1876ee833ec0186db1d.exe
-
Size
868KB
-
MD5
cdb1d6695e80f1876ee833ec0186db1d
-
SHA1
e754b25190ce2b9a005a003a523cb7d8aae98fde
-
SHA256
07a35cc76a031e848cccbf6137f60076de013f4a393e4e00e1f18b4c80e6e999
-
SHA512
9876945d9f92c2e36d51f118b8e04920f9e7c99de75144a3b89534f4eacc5dbfda54cbbea010fad446ca123c007836e91b392ee8e93358f8e44806dc796d9bf9
-
SSDEEP
12288:kGjBLiiRqjxP6RMbDpKv9NL0heldQfhihn8EFB1qA+hEX8r5d:kKtiBNP6RM3pKvvL0hCQfhePUh+M3
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 688 set thread context of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeSecurityPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeTakeOwnershipPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeLoadDriverPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeSystemProfilePrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeSystemtimePrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeProfSingleProcessPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeIncBasePriorityPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeCreatePagefilePrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeBackupPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeRestorePrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeShutdownPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeDebugPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeSystemEnvironmentPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeChangeNotifyPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeRemoteShutdownPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeUndockPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeManageVolumePrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeImpersonatePrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: SeCreateGlobalPrivilege 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: 33 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: 34 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: 35 1840 cdb1d6695e80f1876ee833ec0186db1d.exe Token: 36 1840 cdb1d6695e80f1876ee833ec0186db1d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 688 cdb1d6695e80f1876ee833ec0186db1d.exe 1840 cdb1d6695e80f1876ee833ec0186db1d.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96 PID 688 wrote to memory of 1840 688 cdb1d6695e80f1876ee833ec0186db1d.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdb1d6695e80f1876ee833ec0186db1d.exe"C:\Users\Admin\AppData\Local\Temp\cdb1d6695e80f1876ee833ec0186db1d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Local\Temp\cdb1d6695e80f1876ee833ec0186db1d.exe"C:\Users\Admin\AppData\Local\Temp\cdb1d6695e80f1876ee833ec0186db1d.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4132 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:81⤵PID:3532