Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
DEUSEXMKD+22Tr-LNG.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
DEUSEXMKD+22Tr-LNG.exe
Resource
win10v2004-20240802-en
General
-
Target
DEUSEXMKD+22Tr-LNG.exe
-
Size
4.0MB
-
MD5
d60f09f0dd451feb6dec466e505fc8a2
-
SHA1
b120849961868983a8d0441579e6bb55856ebbe7
-
SHA256
9b88f96ff05b00bff38560eb562f2d56254aa85164416a765a0fa1782b979c12
-
SHA512
72bf9b33d6e3dd1f21dfe66b6c7f65e6cd56f613f11069312185da1a68590de90443c395c3e0ef45868840af79a50a2d07bcd8145c5843931899d8302ba4113b
-
SSDEEP
49152:ubb/LKDfkvNWpiTOMxoYGQlAkxpP2vrXG6+WZpULn92zFEi2Tnsrc:uCkvLoYGQlAkxpP2vrXG6A92zFL27sw
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe 4360 DEUSEXMKD+22Tr-LNG.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4360 DEUSEXMKD+22Tr-LNG.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4360 DEUSEXMKD+22Tr-LNG.exe Token: 33 4092 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4092 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4360 DEUSEXMKD+22Tr-LNG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DEUSEXMKD+22Tr-LNG.exe"C:\Users\Admin\AppData\Local\Temp\DEUSEXMKD+22Tr-LNG.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4360
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x500 0x5101⤵
- Suspicious use of AdjustPrivilegeToken
PID:4092
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66KB
MD5c74d260d388f5ac3d95d8c1c3a27c989
SHA15da009086036004a7c670d608d5e1e923aead568
SHA256dc1bebb8ce88d59e4b3130c1ff2c4b7f5df2701c7a71b476b8a6f2ed541db628
SHA5126460db8f73806017d267c0e4e112902956a3bc53853c6a893cff66fe44772305b2c158ef8b58e993806d713aceaddcf2efa7ccf625063678444d3fd20b10546a
-
Filesize
632KB
MD5ddc305fca2a8d80523ad8bc50996480b
SHA17bee723b565267aa355ad9f7f5cf17c74f2cce1f
SHA256af9e46b70c7739547739ddfcdd56b7b218b5bda6e14c49bed3bbc08c2b867216
SHA512acf2064d1b59d73cc5086f9a8c26a5e1fb7e7909e5460d3427d7681ee36709a568146000bbea9464fb173df474c58bda4f87bbbb759ea06ed2fd71d3c6bc0eea
-
Filesize
218KB
MD582dbc53c4e057ad941eb73aba212956e
SHA138a582ce5fbe03e8c5f040d82f89b4797e305860
SHA256eda3f66eedc49ff9b9506c1ccf679a7822104c771eaab3afa367f0d6a2c9bbd5
SHA5126f8e9082750c9cc8eb7bcaf7b7442f52ec55e2b712fff29a3a22868218fbfd605b594314e7be2720fd25f5a89d95774481177429de35acb48d023d39a2767781
-
Filesize
832KB
MD56aab5c90d7c703ed4aefd5100c97fd22
SHA1b6bb0a5614da9565d5ef2a5a23aa0aaa5bd5b3f0
SHA2561b796196d9ae7b15507546d53a2b5aeae36e5b80e6291f02317f6fedab18d74a
SHA5126c1c1cc6da08f49d15f6cbbadc81bdfaa4251d9ecc9321e0de474141534b42f2bc4c4ada053ace81e07635478f945d2266466f45f9e55c3c924c974d86c26251