Resubmissions

13-05-2024 22:03

240513-1yc9ysga66 10

13-05-2024 21:55

240513-1svbaafb7s 10

13-05-2024 21:49

240513-1pmf9sff48 10

13-05-2024 07:47

240513-jmr6asga64 7

13-05-2024 07:44

240513-jksn2sch3w 7

12-05-2024 10:52

240512-myqy6abg9x 7

11-05-2024 13:06

240511-qcaxlaca29 3

11-05-2024 12:19

240511-phhzqaaf23 3

11-05-2024 12:07

240511-paandaab47 3

Analysis

  • max time kernel
    90s
  • max time network
    192s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13-05-2024 07:47

General

  • Target

    Loader.exe

  • Size

    347KB

  • MD5

    1cb742cb95699d994e1cc6810c6f7642

  • SHA1

    103ea603322859742a3e51c5e517a927b9dcd40c

  • SHA256

    c9c660914e4d58a6e0dd460afae6e4af288c9f191ad8592dc95db5a69868fc70

  • SHA512

    79f9a70232b3470ef9386d9b3d987b5370d0562959315d8239509000a1aa9274b13cecc4c6c871cd4d258a0cd19d30574e3280edd54fb108b6ffca7d8c7e4795

  • SSDEEP

    6144:RrwFDD0tZzmf7GxMLEYaEzE2d9JK5/J1pZKM35QM6KkfiruhbOuzB:Rg07e7seE2dK71rKu5Q6kfirIbOuF

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\Loader.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Checker.exe

    Filesize

    760B

    MD5

    2f6413bc7de38fc5a36373b1d7ee4478

    SHA1

    3240d3117463e0fdc487461a544532670cac343a

    SHA256

    314d020d32eb3231e0adff3fd821dd00531a325f753705a44ca33b0a288c87cc

    SHA512

    9dd01c2689d67eeaddceb81dffed94895facbf0e15914e374bb59c844d983bf6628cffc87d2a379fbfbad8d3c21cba928a3b6e7c86efefd2538ef856662885cb

  • memory/4952-0-0x0000000000CB0000-0x0000000000D0E000-memory.dmp

    Filesize

    376KB

  • memory/4952-1-0x00007FFB9C413000-0x00007FFB9C415000-memory.dmp

    Filesize

    8KB

  • memory/4952-2-0x00007FFB9C410000-0x00007FFB9CED2000-memory.dmp

    Filesize

    10.8MB

  • memory/4952-13-0x00007FFB9C410000-0x00007FFB9CED2000-memory.dmp

    Filesize

    10.8MB