Analysis

  • max time kernel
    300s
  • max time network
    229s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-03-2024 06:18

General

  • Target

    Kiwi X/bin/ver.txt

  • Size

    8B

  • MD5

    a5531945d8ab786b0d9225da5cabd495

  • SHA1

    1c9cb55e882c7f72ca209c735b3808f156f880cb

  • SHA256

    1cc4396d79cf3c9c177e0e536f2c2894f1dd386a4ea91330b631703a321b9ab8

  • SHA512

    26aaf1c53bc9aa8cb38951ca2c3c5e2df58a3c304542aea84d1319350282fe8fdff5f29cd0d05de7f5d83156bab2f54b0217834fd31ccebace121dbc76b6eeab

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE "C:\Users\Admin\AppData\Local\Temp\Kiwi X\bin\ver.txt"
    1⤵
      PID:8
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:1516
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5068

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/5068-0-0x000001C74F440000-0x000001C74F450000-memory.dmp

        Filesize

        64KB

      • memory/5068-16-0x000001C74F540000-0x000001C74F550000-memory.dmp

        Filesize

        64KB

      • memory/5068-32-0x000001C757870000-0x000001C757871000-memory.dmp

        Filesize

        4KB

      • memory/5068-34-0x000001C7578A0000-0x000001C7578A1000-memory.dmp

        Filesize

        4KB

      • memory/5068-35-0x000001C7578A0000-0x000001C7578A1000-memory.dmp

        Filesize

        4KB

      • memory/5068-36-0x000001C7579B0000-0x000001C7579B1000-memory.dmp

        Filesize

        4KB