Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 08:37
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Client.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
Client.exe
-
Size
8.4MB
-
MD5
b4f79cc7175d2a255998f884bd6a79ef
-
SHA1
21e94c467fc0e584424d38fe107f7ee467ea05f7
-
SHA256
5c455e1ac195be85dc6f1d528a5796e4132e9cc380d345e2d670488fb0247d86
-
SHA512
a74a8b9ce1453423561e06e30b18a8769f8a5bc6b87eb4a598e04946df7cfeda80a54aa01d77591aa9e1ff1504da3e1e14c223d2112753925b0cfe342345d1f9
-
SSDEEP
98304:mvB2pC6XG4HNkq5UKPhc24Y1/QPldHV7gPNhV0ADXqQgpkWDRIZVMnu0jjD8ueJf:ZcUG4raKu24YY7HV74hV0AD6QgqKRgX
Score
7/10
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/4644-0-0x0000000000550000-0x0000000000DC0000-memory.dmp agile_net
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3696 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵