Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2024 20:22

General

  • Target

    d4709bf25d80878c5dcdbfbe7472095f.exe

  • Size

    55KB

  • MD5

    d4709bf25d80878c5dcdbfbe7472095f

  • SHA1

    389940797735854a92e342947508a46471a51aa8

  • SHA256

    794ec17f9cf02cde1f0b82cabc0895747939c39b09cbc1c7eed06eb898037456

  • SHA512

    9d285f5d299b5410839389887435acf06e2005ce4b8411b632789535a2ca13ad70ee5209fa1e239c81b85987ae39870acbdd4964e6c64e841f3586d35b38a18e

  • SSDEEP

    768:TDC8h57dEp5ta+hO5MG+a0uM7OaC0lmi1z5J8ryeqUpsTjNwd4aU:P9dEDG9+I0lxHaLsivU

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
    "C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
      C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
        C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
          C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1804
          • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
            C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2024
            • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
              C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4160
              • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4092
                • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                  C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3876
                  • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                    C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                    9⤵
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:684
                    • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                      C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                      10⤵
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1164
                      • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                        C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                        11⤵
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2464
                        • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                          C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                          12⤵
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:5036
                          • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                            C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                            13⤵
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:4640
                            • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                              C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                              14⤵
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:3544
                              • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                15⤵
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:2888
                                • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                  C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                  16⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of WriteProcessMemory
                                  PID:4400
                                  • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                    C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                    17⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:1980
                                    • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                      C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                      18⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:2220
                                      • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                        C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                        19⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:2540
                                        • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                          C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                          20⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:5012
                                          • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                            C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                            21⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Suspicious use of WriteProcessMemory
                                            PID:500
                                            • C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                              C:\Users\Admin\AppData\Local\Temp\d4709bf25d80878c5dcdbfbe7472095f.exe
                                              22⤵
                                                PID:440
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4104 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2084

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\d4709bf25d80878c5dcdbfbe7472095f.exe.log

        Filesize

        408B

        MD5

        1d203de3a7cf77a07afc4969f7440179

        SHA1

        9a047c668bd788e0657efd190eb2768b55aebd28

        SHA256

        4635fe9eea013cf6bf470a413c7562d5e668ae02c149e595cbd40d2f40f3f9b8

        SHA512

        04acf884a5569532019bff7fcdf83427aa95f64b2c8a28d6497d4c350dcd7be19c28768bf40de861616bc174b41f9b167ac940878a0f84c45452153a83f257b4

      • memory/684-39-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/684-40-0x00000000015C0000-0x00000000015D0000-memory.dmp

        Filesize

        64KB

      • memory/684-42-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/684-41-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1088-10-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1088-6-0x0000000000F10000-0x0000000000F20000-memory.dmp

        Filesize

        64KB

      • memory/1088-2-0x0000000000F10000-0x0000000000F20000-memory.dmp

        Filesize

        64KB

      • memory/1088-7-0x000000001E480000-0x000000001E526000-memory.dmp

        Filesize

        664KB

      • memory/1088-5-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1088-4-0x000000001B8F0000-0x000000001B98C000-memory.dmp

        Filesize

        624KB

      • memory/1088-1-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1088-3-0x000000001BF20000-0x000000001C3EE000-memory.dmp

        Filesize

        4.8MB

      • memory/1088-0-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1164-45-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1164-43-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1164-44-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1796-9-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1796-15-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1796-11-0x0000000000CC0000-0x0000000000CD0000-memory.dmp

        Filesize

        64KB

      • memory/1796-12-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1804-19-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1804-21-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1804-22-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/1804-20-0x00000000015D0000-0x00000000015E0000-memory.dmp

        Filesize

        64KB

      • memory/2024-25-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/2024-26-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/2024-24-0x00000000017D0000-0x00000000017E0000-memory.dmp

        Filesize

        64KB

      • memory/2024-23-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/2464-46-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/2464-47-0x0000000001300000-0x0000000001310000-memory.dmp

        Filesize

        64KB

      • memory/2464-48-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/2464-49-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/2524-17-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/2524-16-0x0000000000FF0000-0x0000000001000000-memory.dmp

        Filesize

        64KB

      • memory/2524-14-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/2524-18-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/2888-62-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/2888-65-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/2888-64-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/2888-63-0x0000000000D90000-0x0000000000DA0000-memory.dmp

        Filesize

        64KB

      • memory/3544-61-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/3544-58-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/3544-60-0x00000000012D0000-0x00000000012E0000-memory.dmp

        Filesize

        64KB

      • memory/3544-59-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/3876-36-0x0000000001800000-0x0000000001810000-memory.dmp

        Filesize

        64KB

      • memory/3876-38-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/3876-37-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/3876-35-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/4092-31-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/4092-34-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/4092-33-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/4092-32-0x0000000000D20000-0x0000000000D30000-memory.dmp

        Filesize

        64KB

      • memory/4160-27-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/4160-30-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/4160-29-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/4160-28-0x0000000001100000-0x0000000001110000-memory.dmp

        Filesize

        64KB

      • memory/4640-54-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/4640-57-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/4640-56-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/4640-55-0x0000000000A60000-0x0000000000A70000-memory.dmp

        Filesize

        64KB

      • memory/5036-50-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/5036-51-0x0000000001090000-0x00000000010A0000-memory.dmp

        Filesize

        64KB

      • memory/5036-53-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB

      • memory/5036-52-0x00007FFE6D1E0000-0x00007FFE6DB81000-memory.dmp

        Filesize

        9.6MB