Analysis
-
max time kernel
1580s -
max time network
1167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 07:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
gorshochek.zip
Resource
win10v2004-20240412-en
1 signatures
1800 seconds
General
-
Target
gorshochek.zip
-
Size
448KB
-
MD5
06efbab49aa7202bf2523ec095a6e1ba
-
SHA1
481eb6d48b4029d9eea13769fee5e74641051efd
-
SHA256
49c16aebecdb9af4c51979e56842b819950af2a568351a95af4b8fa72f47f64b
-
SHA512
c91b622a8b50fd9f9a2ffb3bfb28625b3ca2439d4d21a31a8dc72841084a8b8ba73b50f0839647964a7523b2cf5966e63c19a2387f2b762bec442c945c23dbc1
-
SSDEEP
6144:Z8HdW20OW7tFMcxB9TH9d/gDtorIKtFVYcywbvtnpoTbmM7yoxOcUGLaGy0/Xy0c:W9fc74cxB9Jd/gfKlY+RAjrBLaY/3Kl
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4224 svchost.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\gorshochek.zip1⤵PID:2476
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2908
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3632
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4224