Resubmissions

06/04/2024, 02:27

240406-cxlmyahb6x 3

06/04/2024, 02:26

240406-cwvjfshb5t 3

06/04/2024, 02:25

240406-cwkn9ahb4y 10

06/04/2024, 02:21

240406-cszc8shb2v 7

06/04/2024, 02:19

240406-cr7cfshg29 3

06/04/2024, 02:18

240406-crp36shg25 10

06/04/2024, 02:17

240406-cq78csha81 3

Analysis

  • max time kernel
    578s
  • max time network
    577s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2024, 02:19

General

  • Target

    compiler.exe

  • Size

    89KB

  • MD5

    dd98a43cb27efd5bcc29efb23fdd6ca5

  • SHA1

    38f621f3f0df5764938015b56ecfa54948dde8f5

  • SHA256

    1cf20b8449ea84c684822a5e8ab3672213072db8267061537d1ce4ec2c30c42a

  • SHA512

    871a2079892b1eb54cb761aebd500ac8da96489c3071c32a3dab00200f74f4e12b9ab6c62623c53aea5b8be3fc031fb1b3e628ffe15d73323d917083240742b0

  • SSDEEP

    1536:Ee7h7q/J6K3nHC+AGUob2f0DBFPbPWNPWp350NHcHkDsWqxcd2ZPSAv:Ee7oU8HC+AGUu2abPbPWQpO8E0A2tSAv

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\compiler.exe
    "C:\Users\Admin\AppData\Local\Temp\compiler.exe"
    1⤵
      PID:1052
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:5036
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1604

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

        Filesize

        16KB

        MD5

        43f593c7e09ec02304ae039bc7929358

        SHA1

        02e29d72583a9cca8223ec798f390e07060e45a2

        SHA256

        ed8b6cf09c835cb0779810151be0dcde16e1e0cb4dfddb98b1aa8794b731a49b

        SHA512

        280611a3278b05688c90d2e93836e73b32725a25b1cea7bee3ae46a8982f03dcc508302f242b6b3c55371521161a2bb1d6dbdaff005a4e2438507f6c867f1a81

      • memory/1604-40-0x0000021DEB4A0000-0x0000021DEB4A1000-memory.dmp

        Filesize

        4KB

      • memory/1604-42-0x0000021DEB4A0000-0x0000021DEB4A1000-memory.dmp

        Filesize

        4KB

      • memory/1604-33-0x0000021DEB4A0000-0x0000021DEB4A1000-memory.dmp

        Filesize

        4KB

      • memory/1604-34-0x0000021DEB4A0000-0x0000021DEB4A1000-memory.dmp

        Filesize

        4KB

      • memory/1604-35-0x0000021DEB4A0000-0x0000021DEB4A1000-memory.dmp

        Filesize

        4KB

      • memory/1604-36-0x0000021DEB4A0000-0x0000021DEB4A1000-memory.dmp

        Filesize

        4KB

      • memory/1604-37-0x0000021DEB4A0000-0x0000021DEB4A1000-memory.dmp

        Filesize

        4KB

      • memory/1604-38-0x0000021DEB4A0000-0x0000021DEB4A1000-memory.dmp

        Filesize

        4KB

      • memory/1604-39-0x0000021DEB4A0000-0x0000021DEB4A1000-memory.dmp

        Filesize

        4KB

      • memory/1604-43-0x0000021DEB0D0000-0x0000021DEB0D1000-memory.dmp

        Filesize

        4KB

      • memory/1604-32-0x0000021DEB480000-0x0000021DEB481000-memory.dmp

        Filesize

        4KB

      • memory/1604-41-0x0000021DEB4A0000-0x0000021DEB4A1000-memory.dmp

        Filesize

        4KB

      • memory/1604-0-0x0000021DE2D90000-0x0000021DE2DA0000-memory.dmp

        Filesize

        64KB

      • memory/1604-44-0x0000021DEB0C0000-0x0000021DEB0C1000-memory.dmp

        Filesize

        4KB

      • memory/1604-46-0x0000021DEB0D0000-0x0000021DEB0D1000-memory.dmp

        Filesize

        4KB

      • memory/1604-49-0x0000021DEB0C0000-0x0000021DEB0C1000-memory.dmp

        Filesize

        4KB

      • memory/1604-52-0x0000021DEB000000-0x0000021DEB001000-memory.dmp

        Filesize

        4KB

      • memory/1604-16-0x0000021DE2E90000-0x0000021DE2EA0000-memory.dmp

        Filesize

        64KB

      • memory/1604-64-0x0000021DEB200000-0x0000021DEB201000-memory.dmp

        Filesize

        4KB

      • memory/1604-66-0x0000021DEB210000-0x0000021DEB211000-memory.dmp

        Filesize

        4KB

      • memory/1604-67-0x0000021DEB210000-0x0000021DEB211000-memory.dmp

        Filesize

        4KB

      • memory/1604-68-0x0000021DEB320000-0x0000021DEB321000-memory.dmp

        Filesize

        4KB