Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-04-2024 18:46

General

  • Target

    Executor/app/Qt6Gui.dll

  • Size

    7.4MB

  • MD5

    b8f3c8eeaa963fd96c12fa36c5af6593

  • SHA1

    64513814ebc555121a83102e27649f710c9fc37f

  • SHA256

    d2da55714d56e0af7c033fd0a84dd1dcd669e976abc07861e70b054c7d08c01e

  • SHA512

    b8d8cfe1f58bc77b8e90fb80996223b7df075113c113a2016b15840a04eb36a5cc687639ab267af5bec6185f5ca4d5b847e9ec3c2cc9ff38f9144852c2e94a42

  • SSDEEP

    49152:r+F5DQxeQIZzobeYujoAp/NedguLYtKUv+UFrf9S4l/gXkfCSd44hP/YgGjh8nt0:tbe5jtKWFrflHSxi4TJkhC3D26wo6n6R

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Executor\app\Qt6Gui.dll,#1
    1⤵
      PID:5036
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:308
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3808

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3808-16-0x000001CB56B50000-0x000001CB56B60000-memory.dmp

        Filesize

        64KB

      • memory/3808-0-0x000001CB56A50000-0x000001CB56A60000-memory.dmp

        Filesize

        64KB

      • memory/3808-32-0x000001CB5EEC0000-0x000001CB5EEC1000-memory.dmp

        Filesize

        4KB

      • memory/3808-34-0x000001CB5EEF0000-0x000001CB5EEF1000-memory.dmp

        Filesize

        4KB

      • memory/3808-36-0x000001CB5F000000-0x000001CB5F001000-memory.dmp

        Filesize

        4KB

      • memory/3808-35-0x000001CB5EEF0000-0x000001CB5EEF1000-memory.dmp

        Filesize

        4KB