Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 05:00
Behavioral task
behavioral1
Sample
ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe
Resource
win10v2004-20241007-en
General
-
Target
ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe
-
Size
5.3MB
-
MD5
6a087702fae4ea2d0f0669d27a8b5240
-
SHA1
f2764ed221470921c20ddcfb6342a3cc771dd2fd
-
SHA256
ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00
-
SHA512
fcd13aa37b0e819d492e10706d67172c9b6bb2b390ce4bfbbd73dcb43974387d72b1c85fe901605a04e7cb6c6d7f651e53d465a9cc7beaeb90c0f042a814eebd
-
SSDEEP
98304:1n8DAizMykPFCxrBAhk6oieA5sDlqzNYRRigwswyDNRW8UaX77vReW72iwljXU1R:1naAiPkNCxchmDYzSVbYa5D7Il7mR
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 3172 ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe 3172 ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe 3172 ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: 35 3172 ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4960 wrote to memory of 3172 4960 ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe 84 PID 4960 wrote to memory of 3172 4960 ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe"C:\Users\Admin\AppData\Local\Temp\ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe"C:\Users\Admin\AppData\Local\Temp\ad84529d3beaa375b52f5c0cd7ecf849d80f57f4afaecc860b8bfd1840028b00.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3172
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85KB
MD5edf9d5c18111d82cf10ec99f6afa6b47
SHA1d247f5b9d4d3061e3d421e0e623595aa40d9493c
SHA256d89c7b863fc1ac3a179d45d5fe1b9fd35fb6fbd45171ca68d0d68ab1c1ad04fb
SHA512bf017aa8275c5b6d064984a606c5d40852aa70047759468395fe520f7f68b5452befc3145efaa7c51f8ec3bf71d9e32dbd5633637f040d58ff9a4b6953bf1cbf
-
Filesize
127KB
MD5932bdc91ab651f0772d57a9148ad2de9
SHA1fe3f6b6f012900600c2b49f2d7f9dcee0b6a7835
SHA256d7ff9be03be22e589d8ce2462d44f173375409b2db27a3457c3419ad4ca8c429
SHA5120643bd4926cdb89f75fd238f984604fd87e7cd9b9fba731cf81f55027ecb1b46eccf523e6cef60a726963ed7b3925d938cfeba0c0aeaa70c750abd97121d5571
-
Filesize
748KB
MD58510a7eccbca659a72fb4539487448c7
SHA1f01ec52c798aeea04c006c0cb9f4288a09fcdb52
SHA256c793303259cd00ff05fcf27b8d8a2c6d367b6645cd4a1cd88cde3899ad5665de
SHA5125d591dbf152275084110bfe779bf012839b7f9dd6c18548c15d04e62a326005263fbcd258fbbfd3b75360871cdae55956f874c650e6257345d354ca8453d45dc
-
Filesize
3.4MB
MD5e53156ab1aca26d4b938c9a0fc7246f5
SHA169ea4b9b73397256cc76a77a2bcb68a1a0f9da01
SHA25638d7849a56a17c9f5dce23e08091381b7a02b2c1ee4f66e196e11cd559b0a61c
SHA512416da42f12d6878d952a80c4698fd9c822d3245e86a0e09427a970c479b8d025c6bdb7ab3f6ec2ebe1f2ca08534a6d10a6714af15aec7e6b54f478812e342d60