Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 15:22
Behavioral task
behavioral1
Sample
StartupMonitor.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
StartupMonitor.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
StartupMonitor.msi
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
StartupMonitor.msi
Resource
win10v2004-20240508-en
General
-
Target
StartupMonitor.exe
-
Size
35KB
-
MD5
9c3246d2c896081b47fd5075472d8e6a
-
SHA1
6b2fb02b85c8bbfdbdaed77299b970a5ba2ae295
-
SHA256
e6021d7ae194f8010acadb07f5cb64439295e15328092c932fa2d5778888381e
-
SHA512
c9f772fd0a25ca701c69da33540040362ae6a24caaa3206ac5f25013bfc6bb8e74809dc64529760b009377f78f7bd3c681a4ad1d046a9dbcf60752f2b0fb7ccc
-
SSDEEP
768:sqBXsYbaKzHsEcX/55DcLKhClYWvo2XP+/rp7Z+duP:sqBXsYbTHsEcv55ILkCbv9O9+duP
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1828-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/1828-1-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1828 StartupMonitor.exe Token: SeIncBasePriorityPrivilege 1828 StartupMonitor.exe Token: 33 1828 StartupMonitor.exe Token: SeIncBasePriorityPrivilege 1828 StartupMonitor.exe