Analysis

  • max time kernel
    68s
  • max time network
    78s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2024 04:31

General

  • Target

    VirusShare_01b55404de50bd1a56343b2f316ff88d.exe

  • Size

    121KB

  • MD5

    01b55404de50bd1a56343b2f316ff88d

  • SHA1

    8a6b9599d3e71c83eaef7f5a23df21b4f41370b1

  • SHA256

    69bd652ace6469311a49a12f66bbbc691bdfc69aba958dd02d928464cbb46609

  • SHA512

    f1ec4bf6768dea2edc53c72dd7c884641a464f4268d21480bb55fbdb1079b8c5c9fb50eab4b29d13acb4a8682ca6ae291341e01b748e228b185676e48df2e598

  • SSDEEP

    3072:JrhJGtDfYtWAh3A8lKl+/63VBwxkbwQXz8lFTnc:JrhJoDfY13KE/qVlNYvnc

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirusShare_01b55404de50bd1a56343b2f316ff88d.exe
    "C:\Users\Admin\AppData\Local\Temp\VirusShare_01b55404de50bd1a56343b2f316ff88d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4444
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3516
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3792 --field-trial-handle=2356,i,13261194862334667799,7441241219475888176,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:492

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads