Analysis

  • max time kernel
    3s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 17:20

General

  • Target

    wake-synchotron-v1.0/Player.exe

  • Size

    15KB

  • MD5

    eae7556aaf215a32903c72688e11463a

  • SHA1

    91d82c7a84dd63b4045b2c158510080ba04c631a

  • SHA256

    3882b9119101ec081f7ed8c6c9f19f34799325de919b139ed974a6ca43725e00

  • SHA512

    fafa752286805a0572faf5d0e07b58c96359c4cd8d363869744569e3d0bfb202473105a6db1b3351b7c852cdfbd607c655c48ff765b086a4c57237faa3781277

  • SSDEEP

    192:qAD1n/OGTTGzsg6bNqOBQQlef3NKMR8UOoTkGiM8I88zJm8bJ5jsEJSL9Z:7gsNBqh6NMFkG08z55jsEy

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\wake-synchotron-v1.0\Player.exe
    "C:\Users\Admin\AppData\Local\Temp\wake-synchotron-v1.0\Player.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:376
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x52c 0x520
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:5116

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/376-0-0x0000000074B1E000-0x0000000074B1F000-memory.dmp

    Filesize

    4KB

  • memory/376-1-0x0000000000B50000-0x0000000000B5A000-memory.dmp

    Filesize

    40KB

  • memory/376-3-0x00000000058B0000-0x00000000058FA000-memory.dmp

    Filesize

    296KB

  • memory/376-2-0x0000000005470000-0x000000000549A000-memory.dmp

    Filesize

    168KB

  • memory/376-4-0x0000000005900000-0x000000000594C000-memory.dmp

    Filesize

    304KB

  • memory/376-6-0x0000000005950000-0x0000000005976000-memory.dmp

    Filesize

    152KB

  • memory/376-7-0x0000000005880000-0x0000000005892000-memory.dmp

    Filesize

    72KB

  • memory/376-5-0x00000000059F0000-0x0000000005A82000-memory.dmp

    Filesize

    584KB

  • memory/376-8-0x0000000006040000-0x00000000065E4000-memory.dmp

    Filesize

    5.6MB

  • memory/376-9-0x0000000005AC0000-0x0000000005AE4000-memory.dmp

    Filesize

    144KB

  • memory/376-11-0x0000000005B70000-0x0000000005BA8000-memory.dmp

    Filesize

    224KB

  • memory/376-10-0x0000000005B30000-0x0000000005B6A000-memory.dmp

    Filesize

    232KB

  • memory/376-12-0x0000000074B10000-0x00000000752C0000-memory.dmp

    Filesize

    7.7MB

  • memory/376-13-0x0000000005D20000-0x0000000005D2A000-memory.dmp

    Filesize

    40KB

  • memory/376-14-0x000000000ADE0000-0x000000000ADF4000-memory.dmp

    Filesize

    80KB

  • memory/376-16-0x000000000AE30000-0x000000000AE52000-memory.dmp

    Filesize

    136KB

  • memory/376-15-0x000000000AEB0000-0x000000000AF60000-memory.dmp

    Filesize

    704KB

  • memory/376-18-0x000000000AEA0000-0x000000000AEAA000-memory.dmp

    Filesize

    40KB

  • memory/376-17-0x000000000AF70000-0x000000000AF8E000-memory.dmp

    Filesize

    120KB

  • memory/376-19-0x000000006FB90000-0x000000006FBE7000-memory.dmp

    Filesize

    348KB

  • memory/376-22-0x0000000074B10000-0x00000000752C0000-memory.dmp

    Filesize

    7.7MB

  • memory/376-23-0x000000000C2A0000-0x000000000C320000-memory.dmp

    Filesize

    512KB

  • memory/376-24-0x0000000074B1E000-0x0000000074B1F000-memory.dmp

    Filesize

    4KB

  • memory/376-25-0x0000000074B10000-0x00000000752C0000-memory.dmp

    Filesize

    7.7MB