Analysis

  • max time kernel
    131s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 14:23

General

  • Target

    金不换登陆器0202.exe

  • Size

    2.4MB

  • MD5

    a4f7f9dae75b5123a547833c39b84649

  • SHA1

    ceb2ea61a430cc5e6dea20f02e042db01f833633

  • SHA256

    e602799ce856504dc0b07263cfcead50c292f09e7487346f3ce5a00643d4ea19

  • SHA512

    495eb31a26ca866e8d4bb20523af799eb76ddcb15913dd07b2fd0460a017a166d4bf3b88c6bac4561900b58891a26001a9450deaa7d9cc976da78ba189043f4c

  • SSDEEP

    24576:1NYBOwECGmyyMy7/CFchptdDrGnrdEROGHOhXLegMZt4zEyje0sMsiC/hRJHOh:aOrCG52PdDqnroHOpL2h0J+HO

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\金不换登陆器0202.exe
    "C:\Users\Admin\AppData\Local\Temp\金不换登陆器0202.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2124-0-0x0000000000400000-0x000000000066B000-memory.dmp

    Filesize

    2.4MB