Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 06:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c28a2d0a008788b49690b333d501e3f3.exe
Resource
win7-20240419-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
c28a2d0a008788b49690b333d501e3f3.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
c28a2d0a008788b49690b333d501e3f3.exe
-
Size
3.6MB
-
MD5
c28a2d0a008788b49690b333d501e3f3
-
SHA1
6a25fdb8613db00b09d4d6e1ad302c20c7f7e2c4
-
SHA256
f61712dccccf8f19c6dbf0dfb7c7c0be9eb2f13d3381ee94e4cb6cb70ffb5f5a
-
SHA512
455923a63e60b6079d7e0af2bfae5f922b205d024def456ae95158ef1bfcdbc4f56e24b4421a2203f4618d0ea29e229e331c7ee0d7881ee8ebac83fa72f5d788
-
SSDEEP
49152:U1oQZv/+4a3xWcOZL/Glf1jSGS/P58ahntq7d59ZFVcjAflZWExUBv33E8ep50:U1fv/+R3sla6/P58ahn8zFVA6ZWRU95
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4264 set thread context of 4384 4264 c28a2d0a008788b49690b333d501e3f3.exe 91 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4264 c28a2d0a008788b49690b333d501e3f3.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4264 wrote to memory of 4384 4264 c28a2d0a008788b49690b333d501e3f3.exe 91 PID 4264 wrote to memory of 4384 4264 c28a2d0a008788b49690b333d501e3f3.exe 91 PID 4264 wrote to memory of 4384 4264 c28a2d0a008788b49690b333d501e3f3.exe 91 PID 4264 wrote to memory of 4384 4264 c28a2d0a008788b49690b333d501e3f3.exe 91 PID 4264 wrote to memory of 4384 4264 c28a2d0a008788b49690b333d501e3f3.exe 91 PID 4264 wrote to memory of 4384 4264 c28a2d0a008788b49690b333d501e3f3.exe 91 PID 4264 wrote to memory of 4384 4264 c28a2d0a008788b49690b333d501e3f3.exe 91 PID 4264 wrote to memory of 4384 4264 c28a2d0a008788b49690b333d501e3f3.exe 91 PID 4264 wrote to memory of 4384 4264 c28a2d0a008788b49690b333d501e3f3.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c28a2d0a008788b49690b333d501e3f3.exe"C:\Users\Admin\AppData\Local\Temp\c28a2d0a008788b49690b333d501e3f3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4216,i,9746875443948590908,1444894342962555245,262144 --variations-seed-version --mojo-platform-channel-handle=4332 /prefetch:81⤵PID:4824