Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 09:15
Static task
static1
Behavioral task
behavioral1
Sample
02c30c17521583ea84bbfc2c9d2c1ddea3d812deb993a3e8fda66a80fcda11a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
02c30c17521583ea84bbfc2c9d2c1ddea3d812deb993a3e8fda66a80fcda11a2.exe
Resource
win10v2004-20240226-en
General
-
Target
02c30c17521583ea84bbfc2c9d2c1ddea3d812deb993a3e8fda66a80fcda11a2.exe
-
Size
208KB
-
MD5
d2507fe06027d9aab0576208678cabb2
-
SHA1
03f63ba8cead4953d2b06febbb1066060bb91eb5
-
SHA256
02c30c17521583ea84bbfc2c9d2c1ddea3d812deb993a3e8fda66a80fcda11a2
-
SHA512
bee001ce9a943db23dd8d7a087217698e83c1df2e02f79dc4404217fc838756ba7fc5e8c46744a4edc2aa9fc24aae41f4cbea727aeb775426df14307fdefe36c
-
SSDEEP
6144:A49idl8rgiwiQztwEVdiVbMSpILIYBpYPyC9YjVnS1c:oCQBHbyvpIMYjC9YjlS1c
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2260 02c30c17521583ea84bbfc2c9d2c1ddea3d812deb993a3e8fda66a80fcda11a2.exe 2260 02c30c17521583ea84bbfc2c9d2c1ddea3d812deb993a3e8fda66a80fcda11a2.exe 2260 02c30c17521583ea84bbfc2c9d2c1ddea3d812deb993a3e8fda66a80fcda11a2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2260 02c30c17521583ea84bbfc2c9d2c1ddea3d812deb993a3e8fda66a80fcda11a2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2260 wrote to memory of 1952 2260 02c30c17521583ea84bbfc2c9d2c1ddea3d812deb993a3e8fda66a80fcda11a2.exe 91 PID 2260 wrote to memory of 1952 2260 02c30c17521583ea84bbfc2c9d2c1ddea3d812deb993a3e8fda66a80fcda11a2.exe 91 PID 1952 wrote to memory of 1936 1952 csc.exe 93 PID 1952 wrote to memory of 1936 1952 csc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\02c30c17521583ea84bbfc2c9d2c1ddea3d812deb993a3e8fda66a80fcda11a2.exe"C:\Users\Admin\AppData\Local\Temp\02c30c17521583ea84bbfc2c9d2c1ddea3d812deb993a3e8fda66a80fcda11a2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\psjdkrbv\psjdkrbv.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES887.tmp" "c:\Users\Admin\AppData\Local\Temp\psjdkrbv\CSCD3F9FEF3B7F94BA494DBF0ABB7D23F1B.TMP"3⤵PID:1936
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3904 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:81⤵PID:1016
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50486909cf876ce1f1678720d050985c3
SHA1cf4d4f3ef34f37ee6eb8042b1d657d367b484c32
SHA2564f4633689779e6ae4996e4649a406fd432c551c34cbdc8d6ce08f79308590928
SHA5126f34db21e96ad5afdcd8d218008ad0881ba013930310cecc119ee8c5a9932dec6b5accab811bcdb88a3dd21884f26d8243cb56c95d147ce63839f32456db1a8d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4KB
MD5c3703a4f2bcf956b3d24c14d75f2768a
SHA14efe6f2c97f805d8f436e2819fa85b128fe89435
SHA256f78fe6f24d00218a770a16227984d718aa6623d9332a35c9f7aaf86036f25395
SHA51248ade540ff27ea0e2715b7f9418b4c5232db968b98f54072c56d3358209bd9bb537d17dc3d5e96bfab084445ab7cf845c7336b960f01c22499d6a02e939dc657
-
Filesize
652B
MD56e191ad9f2e5a0c32afe05d9725ee520
SHA1db0985f538353768f9a570b80251e16e3febf11d
SHA2565edd946470b8071f240bb930b753106e0bb0550091e3c09a4be7dd38fe875f90
SHA51296a004f44f29eba265dc2232ee42f4f069d7e33e03c1f5f8e42df047df97b82c809a795e5575568ac08b30b1a75e02c66e90dd7234bf0d61f3a973b5cc6972b8
-
Filesize
2KB
MD5d6903db69f780878cea04b39e372b50c
SHA14f8a0647dbd1f64deb6b6b5a3688794b203d4aa1
SHA256c19e606ab57aeba8afd2cded4ff7f2d2f86cabba200b39cf206decee0735124b
SHA5122bd1df66af8a5bcff9b22200cf7977d850af9ddaf056669846e52f5e1e574d4bbbacb26fe38f2b63afb0784ab4064f3e89b19f706f2cfb9ae2e31735b6e2b9f3
-
Filesize
594B
MD5717783aaf61c202fdf9a91927aaa9625
SHA1a2565e1886019a450c5ac32927e10b5932d8ee78
SHA2569c7c43bea4339214da3ecab8137f7555d74e125c26099cf74d9ef8e36acacf67
SHA512beed30a35907251bc04f078ff10cb5b8b3232bace90b04386ad14e1fc116ed4acec5ee89a87561bb2d0c1ea336d96f2835ab4cae94765764f2a9bbd5a18fa505