Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
de1d571b7eba267e01939f28f6720384.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
de1d571b7eba267e01939f28f6720384.exe
Resource
win10v2004-20240319-en
General
-
Target
de1d571b7eba267e01939f28f6720384.exe
-
Size
671KB
-
MD5
de1d571b7eba267e01939f28f6720384
-
SHA1
b6bc19692bb4c9c507c4717197b50ff4445c0d7d
-
SHA256
f81ee35ec800b6e258853fb2e412dbc99a488563253e451f131d772ad7d81238
-
SHA512
5c973feb5450430bd17515ae1161c4755b9f333557472e268086a9aed3dbc6bf91f1026a34161cfac16415278dacec3b1400a2a23836817c8301d0e72a60c051
-
SSDEEP
12288:rM8uzjyO9A9g1lG43dAMWYuNOP1WF3Z4mxxroEtlK+kt9T2MiwkAGGy6:4VzjyWSRYuNOtWQmX8GKGv6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 772 rundll -
Loads dropped DLL 4 IoCs
pid Process 772 rundll 772 rundll 772 rundll 772 rundll -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\rundll de1d571b7eba267e01939f28f6720384.exe File created C:\Windows\GDEWMF.DAT de1d571b7eba267e01939f28f6720384.exe File created C:\Windows\PFQTED.DAT de1d571b7eba267e01939f28f6720384.exe File created C:\Windows\rundll de1d571b7eba267e01939f28f6720384.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1324 de1d571b7eba267e01939f28f6720384.exe Token: SeDebugPrivilege 772 rundll -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 772 rundll -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 772 rundll 772 rundll 772 rundll
Processes
-
C:\Users\Admin\AppData\Local\Temp\de1d571b7eba267e01939f28f6720384.exe"C:\Users\Admin\AppData\Local\Temp\de1d571b7eba267e01939f28f6720384.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
C:\Windows\rundllC:\Windows\rundll1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:772
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3860 --field-trial-handle=2264,i,7994609493164365963,13212734413040148104,262144 --variations-seed-version /prefetch:81⤵PID:3484
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD56853cba3ccc11699c2d840f41c10393f
SHA180a430dcc2cb34b05d433f0f63b8ef8a6a09bbe3
SHA2560bcf3f4ff7862cd885003b8ecc4d424a2fd418fd64412ffe95a9c4221cc3de59
SHA512a02fef8b7c721459fa6f081a1208bf8dd84d957663b4d711b9f6f1731deedf977e5a391ec7481797da7a594c3dd133e84865133855dcdbe6da2128887270114c
-
Filesize
51KB
MD5d58f992c53515c9f1fb9394a46f4cb48
SHA11f9909d227b93be10328e0abc64052da984657ba
SHA25650c6b8848b0a9cf6a6b579928dc6e5c75cf7564c19bb7b40d86ba9d360ebb040
SHA5123a87c279fbbbaff2bfe791c523716ad092c41099b8914ba369565014502d408084259d4efe6896d785c024935b181ca34cf49e3b79f3f1a89ee1c9d775635d94
-
Filesize
671KB
MD5de1d571b7eba267e01939f28f6720384
SHA1b6bc19692bb4c9c507c4717197b50ff4445c0d7d
SHA256f81ee35ec800b6e258853fb2e412dbc99a488563253e451f131d772ad7d81238
SHA5125c973feb5450430bd17515ae1161c4755b9f333557472e268086a9aed3dbc6bf91f1026a34161cfac16415278dacec3b1400a2a23836817c8301d0e72a60c051