Analysis

  • max time kernel
    424s
  • max time network
    450s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2024 07:14

General

  • Target

    resources/app.asar.unpacked/daemon/start_data_layer.exe

  • Size

    11.2MB

  • MD5

    bb1ff40b68dd27a5335a2828d040d15a

  • SHA1

    c610a96bd7990b9ee3c4e8d21e353bc83f769150

  • SHA256

    515f5616033b452192c76208acbc7eb896de4757a8e3e73e91092ab53e5a1a1d

  • SHA512

    3e542adff05efe02d05fb93e80ed3db99fd5399381cbeb07d88f87171c4356f81d3ca2353607b55c5aac5b18aec87eceafb989e088d38ab5c16d41f00198163d

  • SSDEEP

    196608:as81+XomR8upvqAuwo6bVF2Ap6W7IArZXK38lciyNh7fFPkjkDkJJ:6MXqu8iXbVF2c6W751638Q5ZIE+J

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\daemon\start_data_layer.exe
    "C:\Users\Admin\AppData\Local\Temp\resources\app.asar.unpacked\daemon\start_data_layer.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "ver"
      2⤵
        PID:4084

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads