Analysis
-
max time kernel
1575s -
max time network
1515s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
30-03-2024 18:05
Static task
static1
Behavioral task
behavioral1
Sample
Newtonsoft.Json.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
OpenRec.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
OpenRec.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
websocket-sharp.dll
Resource
win10v2004-20240226-en
General
-
Target
OpenRec.exe
-
Size
261KB
-
MD5
7784f159f6bbc4bcd052ddfaa4332035
-
SHA1
bcc9f9b0e16d01182df38c41b355230a4f2ddac8
-
SHA256
4b8c8c159dc61a3e70ddbde9a5a88436ecd80f7b4df10698b39b87a7a0860b7b
-
SHA512
a9917f67ecdf1ebcf0503d69d5096b6dcf6b8b7c78aea089c602c15f13ffcd064f1479c1aa4d2a1c162720be8f97712fca15bda038d9c4401326b965e655cfa0
-
SSDEEP
3072:M6eSqsywT/IiODn5Ikt8pKO9WpheWyutIRzsc5quFyYkm:MLDn5I7p8hen5Y
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
svchost.exedescription pid process Token: SeManageVolumePrivilege 2840 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\OpenRec.exe"C:\Users\Admin\AppData\Local\Temp\OpenRec.exe"1⤵PID:452
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4004
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2840