Analysis
-
max time kernel
159s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe
Resource
win10v2004-20240412-en
General
-
Target
28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe
-
Size
596KB
-
MD5
bf7009315a8152ca8cedbc13aff063c6
-
SHA1
b9f3e2cb5f44ee85f41b6d0c2812641adca75af8
-
SHA256
28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57
-
SHA512
34fcfc974a0062e9b9bf047165269fae2aad2ac093ba07d37dabbda799f9ac031af75abbb73cf11fdd9e1863229fe302f633a1474546011bd72569fa0cc122d9
-
SSDEEP
12288:cXvtax0mS42i1S6jdFvEALUNEDdtxtW79/qGqabRlD:cXF4X1tjXECIEzxtru
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/4652-6-0x000001B777530000-0x000001B777650000-memory.dmp agile_net behavioral2/files/0x000700000002323e-12.dat agile_net -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4652 28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe"C:\Users\Admin\AppData\Local\Temp\28355735712df444fbac698b656b053424ed6454fd3a4eaa6c41be1a3aab7d57.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4652
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD565d967a636e697248559b05b8f208c58
SHA1159aab343e56a60c93f6d032d39f7b9b7b7ad397
SHA256b548727a73fb60b1f484d99fd650ee5bb9e07abf90d5da1ecfb7a344f14fb094
SHA512178331f9795d86bda19697fd15869b6af7bf90e961eb652c9f34b59beff4ab78bf95d44083339bf6cc4dd6cff43180d8b38b022c4340fcccac7aed4c6994876c