Resubmissions

21-04-2024 04:55

240421-fklzqacb2s 8

27-02-2024 19:38

240227-yctzgahf54 8

Analysis

  • max time kernel
    103s
  • max time network
    94s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-04-2024 04:55

General

  • Target

    pivot_v4-2.exe

  • Size

    616KB

  • MD5

    d3eefd47c4e9914b0628ce70eb8bc2d4

  • SHA1

    e62be539433ebab0c86bd6838503fb7a8fed81a5

  • SHA256

    032185876f05ee92ea39feddce819321acb8c4600b5d580396a7e5e29fbc82de

  • SHA512

    5e6be0e425f38958b3a34a9e30ac41c68a90cb50b3f6a331e18864dbcd96c847f8455644d2cb22bb8eae662d35855ce1733093b3dae7cfd26c1a7cc83d7be4ce

  • SSDEEP

    12288:1otU8AmKff8NWuJQnvv5Ehl3qRlWUFxuUN:1L8Am4f8NWuJQnH5Ehl3qlQUN

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pivot_v4-2.exe
    "C:\Users\Admin\AppData\Local\Temp\pivot_v4-2.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5040
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1512
    • C:\Users\Admin\AppData\Local\Temp\pivot_v4-2.exe
      "C:\Users\Admin\AppData\Local\Temp\pivot_v4-2.exe"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3440

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3440-13-0x00007FF8C6B80000-0x00007FF8C7642000-memory.dmp

      Filesize

      10.8MB

    • memory/3440-16-0x00007FF8C6B80000-0x00007FF8C7642000-memory.dmp

      Filesize

      10.8MB

    • memory/3440-15-0x000000001B290000-0x000000001B2A0000-memory.dmp

      Filesize

      64KB

    • memory/3440-14-0x000000001B290000-0x000000001B2A0000-memory.dmp

      Filesize

      64KB

    • memory/5040-8-0x000000001C710000-0x000000001C742000-memory.dmp

      Filesize

      200KB

    • memory/5040-5-0x000000001CD20000-0x000000001CDD2000-memory.dmp

      Filesize

      712KB

    • memory/5040-6-0x000000001C630000-0x000000001C642000-memory.dmp

      Filesize

      72KB

    • memory/5040-7-0x000000001C6B0000-0x000000001C6D0000-memory.dmp

      Filesize

      128KB

    • memory/5040-0-0x0000000000F00000-0x0000000000F9E000-memory.dmp

      Filesize

      632KB

    • memory/5040-9-0x000000001C6D0000-0x000000001C6EE000-memory.dmp

      Filesize

      120KB

    • memory/5040-10-0x000000001C6F0000-0x000000001C70A000-memory.dmp

      Filesize

      104KB

    • memory/5040-11-0x000000001BE30000-0x000000001BE40000-memory.dmp

      Filesize

      64KB

    • memory/5040-12-0x00007FF8C6C30000-0x00007FF8C76F2000-memory.dmp

      Filesize

      10.8MB

    • memory/5040-4-0x000000001C660000-0x000000001C6B0000-memory.dmp

      Filesize

      320KB

    • memory/5040-3-0x000000001C7F0000-0x000000001CD18000-memory.dmp

      Filesize

      5.2MB

    • memory/5040-2-0x000000001BE30000-0x000000001BE40000-memory.dmp

      Filesize

      64KB

    • memory/5040-1-0x00007FF8C6C30000-0x00007FF8C76F2000-memory.dmp

      Filesize

      10.8MB