Resubmissions

14/06/2024, 14:56

240614-sa513avgnh 7

14/06/2024, 14:55

240614-sah7asyhkp 3

14/06/2024, 14:52

240614-r88zyaygqk 3

Analysis

  • max time kernel
    452s
  • max time network
    454s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/06/2024, 14:55

General

  • Target

    CrystalLauncherN.exe

  • Size

    1.5MB

  • MD5

    71ce62ad6a1da34bcc3a0bca71f1e2df

  • SHA1

    c5080fcb7b9ca8a8a267e217a4df2170eafc2bb2

  • SHA256

    7f13bb7a4b4fdab3ee99aa40599314fb2ab48f17c02736e06894c2578b3c0a36

  • SHA512

    f519cae4b8a71700bda63672219e1a9cf15e5a94cc2d7f1b96799144f91bd2d1e6782d637b935051ba2d08d59bf84d363921420b624fcaed21518f19b1fc1d8b

  • SSDEEP

    12288:qXlhhEayVkv/JBdBS4msNUCe65frHMnz2R9aty+v54BgC:qXlhhUQ/bdo4mz1U8z22y+vLC

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CrystalLauncherN.exe
    "C:\Users\Admin\AppData\Local\Temp\CrystalLauncherN.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4336

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\CrystalLauncherInstallerNX\launchlog.txt

          Filesize

          1KB

          MD5

          c563ff54d7c0c1c4317cdbad97808963

          SHA1

          c1a9709b9b500183d7c0f1bd92176d7540db97f2

          SHA256

          809a6469cbd7440c936ef07faaf404d3107e9acb7a8159c12c7e39d0a7ce1c80

          SHA512

          0b88095707437dc82a11bcc276cd5fa537910f5df7898102b1c3d0cba794d32ab932cfd3fdcd23eb092dafbdcca841777bb41988857fe906efaa3e977cfdd144

        • memory/4336-0-0x00007FFDA9783000-0x00007FFDA9785000-memory.dmp

          Filesize

          8KB

        • memory/4336-1-0x0000021143D60000-0x0000021143EF0000-memory.dmp

          Filesize

          1.6MB

        • memory/4336-3-0x0000021145B20000-0x0000021145B98000-memory.dmp

          Filesize

          480KB

        • memory/4336-4-0x00000211442A0000-0x00000211442B8000-memory.dmp

          Filesize

          96KB

        • memory/4336-15-0x00007FFDA9780000-0x00007FFDAA241000-memory.dmp

          Filesize

          10.8MB

        • memory/4336-20-0x00007FFDA9780000-0x00007FFDAA241000-memory.dmp

          Filesize

          10.8MB

        • memory/4336-21-0x00007FFDA9783000-0x00007FFDA9785000-memory.dmp

          Filesize

          8KB

        • memory/4336-22-0x00007FFDA9780000-0x00007FFDAA241000-memory.dmp

          Filesize

          10.8MB

        • memory/4336-23-0x00007FFDA9780000-0x00007FFDAA241000-memory.dmp

          Filesize

          10.8MB