Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 03:21

General

  • Target

    Samsung_FRP_Bypass_tool_[HardReset.info]/bin/cyggcc_s-1.dll

  • Size

    109KB

  • MD5

    d6c813d4571c2957ba9e5bc652f80966

  • SHA1

    8773c9b63715b095699bdae47da43c6ed61ba4d0

  • SHA256

    6e928df3452d150df15308977fe24f7c004e49f9d73070313029ec330c06f51c

  • SHA512

    3605d46a9e698935896989d74f7bf279d1615986069e4f70bebbe2ae5f17c389c938163a5e501be8c56cbfc4ffc273bad79da56c2ac0655b2404e3bae22e89e0

  • SSDEEP

    3072:vJzW5hXNdCee3oMdneEv0imF0YX8NsHaMl2:RzW5h/CeepeEKVks6Mk

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Samsung_FRP_Bypass_tool_[HardReset.info]\bin\cyggcc_s-1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\Samsung_FRP_Bypass_tool_[HardReset.info]\bin\cyggcc_s-1.dll,#1
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5028

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/5028-0-0x00000000644D0000-0x00000000644F3000-memory.dmp

    Filesize

    140KB

  • memory/5028-1-0x0000000061000000-0x00000000614F0000-memory.dmp

    Filesize

    4.9MB