Analysis

  • max time kernel
    135s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2024, 04:25

General

  • Target

    58bdc531c7e5ce9990f65cd0ab4f9d097c45110c8778f0a00df93716d2e4a9e1.exe

  • Size

    738KB

  • MD5

    1c417f0865d2f539de8e8ca388984918

  • SHA1

    645da0d6cca9753265802121c773e42d7acc597c

  • SHA256

    58bdc531c7e5ce9990f65cd0ab4f9d097c45110c8778f0a00df93716d2e4a9e1

  • SHA512

    7046be2ee47591dac4e9b8dac2cc5c4adbc41d551d6f0073188ef8c732a48aeeaa10c540c2bb7338115f7ccb3996b036357607cac4fa811b3bdf6abe77aea797

  • SSDEEP

    192:xPuTunAtt5Pg1lld07xFVd4yywe/2D4Ec7KdT:tYcAP+PlOzVdNpe/REmi

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58bdc531c7e5ce9990f65cd0ab4f9d097c45110c8778f0a00df93716d2e4a9e1.exe
    "C:\Users\Admin\AppData\Local\Temp\58bdc531c7e5ce9990f65cd0ab4f9d097c45110c8778f0a00df93716d2e4a9e1.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3572

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3572-0-0x000000007502E000-0x000000007502F000-memory.dmp

          Filesize

          4KB

        • memory/3572-1-0x0000000000AD0000-0x0000000000ADA000-memory.dmp

          Filesize

          40KB

        • memory/3572-2-0x00000000054F0000-0x0000000005582000-memory.dmp

          Filesize

          584KB

        • memory/3572-3-0x0000000075020000-0x00000000757D0000-memory.dmp

          Filesize

          7.7MB

        • memory/3572-4-0x0000000005D90000-0x0000000006334000-memory.dmp

          Filesize

          5.6MB

        • memory/3572-5-0x0000000006440000-0x00000000064A6000-memory.dmp

          Filesize

          408KB

        • memory/3572-6-0x000000007502E000-0x000000007502F000-memory.dmp

          Filesize

          4KB

        • memory/3572-7-0x0000000075020000-0x00000000757D0000-memory.dmp

          Filesize

          7.7MB