Resubmissions

09-07-2024 13:39

240709-qydwdayanf 7

09-07-2024 07:52

240709-jqdr3swdle 6

09-07-2024 06:42

240709-hgkzcs1bjl 5

09-07-2024 06:34

240709-hb2d6azhjn 3

09-07-2024 05:47

240709-ggxgqa1crh 4

Analysis

  • max time kernel
    142s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 13:39

General

  • Target

    rstrui.exe

  • Size

    288KB

  • MD5

    f400c47a6f59b3835341ab66a20c8e3e

  • SHA1

    45e1cf748ddb97d10cb3de0309641ecc70fb914b

  • SHA256

    f048944f4afa8d2e4cf01ddedcacef9d50c8e433a2854ff7465b7a64bdae00d1

  • SHA512

    186f87ef23ccf957d49c71a7d9e375d48e12d81db65831bc3c038c70622da37346f58a2c67ae957659144d76a0d730d3c7ec247c31e70ee417e4d195aec7515b

  • SSDEEP

    6144:/wQP+001eYhSgKsJQzs8IzAang/2+UvQ/KpmOq:/w++001eYYgKsJj1zAKrvQ/Kp

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rstrui.exe
    "C:\Users\Admin\AppData\Local\Temp\rstrui.exe"
    1⤵
      PID:3840
    • C:\Windows\system32\wbengine.exe
      "C:\Windows\system32\wbengine.exe"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1544

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads