Analysis

  • max time kernel
    113s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:09

General

  • Target

    2b820e3de58782883087f0783d484f95.exe

  • Size

    6.5MB

  • MD5

    2b820e3de58782883087f0783d484f95

  • SHA1

    b5a4c93813e01b10f948cd46e83ae16c64299284

  • SHA256

    b5eaf05525428e4f6db4343e9070a7afefb91694926e3c75b7b0ec0d16cf57c8

  • SHA512

    f48ad7fae5b3c453dd6e7a291836376865e690b20bca38e6465832dd6c5d7aa568f655939e4f3f530eec4285bf01b23e7acec72c52a691fd31d92e3b05bce984

  • SSDEEP

    98304:0VgvtU3ioYGQlAkxpP2vrXGwy6T4ng5WbkTYFnZ2+mPjcElY5ZubP+uvq:0T2GIAkxpuvrXGwygzEFQ+pEl0Zuj

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 4 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b820e3de58782883087f0783d484f95.exe
    "C:\Users\Admin\AppData\Local\Temp\2b820e3de58782883087f0783d484f95.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:6088
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x2f4 0x404
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4948

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Bass.Net.dll

    Filesize

    632KB

    MD5

    ddc305fca2a8d80523ad8bc50996480b

    SHA1

    7bee723b565267aa355ad9f7f5cf17c74f2cce1f

    SHA256

    af9e46b70c7739547739ddfcdd56b7b218b5bda6e14c49bed3bbc08c2b867216

    SHA512

    acf2064d1b59d73cc5086f9a8c26a5e1fb7e7909e5460d3427d7681ee36709a568146000bbea9464fb173df474c58bda4f87bbbb759ea06ed2fd71d3c6bc0eea

  • C:\Users\Admin\AppData\Local\Temp\Bass.dll

    Filesize

    218KB

    MD5

    82dbc53c4e057ad941eb73aba212956e

    SHA1

    38a582ce5fbe03e8c5f040d82f89b4797e305860

    SHA256

    eda3f66eedc49ff9b9506c1ccf679a7822104c771eaab3afa367f0d6a2c9bbd5

    SHA512

    6f8e9082750c9cc8eb7bcaf7b7442f52ec55e2b712fff29a3a22868218fbfd605b594314e7be2720fd25f5a89d95774481177429de35acb48d023d39a2767781

  • C:\Users\Admin\AppData\Local\Temp\tmp9858.tmp

    Filesize

    832KB

    MD5

    6aab5c90d7c703ed4aefd5100c97fd22

    SHA1

    b6bb0a5614da9565d5ef2a5a23aa0aaa5bd5b3f0

    SHA256

    1b796196d9ae7b15507546d53a2b5aeae36e5b80e6291f02317f6fedab18d74a

    SHA512

    6c1c1cc6da08f49d15f6cbbadc81bdfaa4251d9ecc9321e0de474141534b42f2bc4c4ada053ace81e07635478f945d2266466f45f9e55c3c924c974d86c26251

  • memory/6088-20-0x00000140667A0000-0x00000140667F8000-memory.dmp

    Filesize

    352KB

  • memory/6088-29-0x0000014066110000-0x0000014066116000-memory.dmp

    Filesize

    24KB

  • memory/6088-2-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-10-0x0000014066810000-0x00000140668B2000-memory.dmp

    Filesize

    648KB

  • memory/6088-0-0x00007FFC919B3000-0x00007FFC919B5000-memory.dmp

    Filesize

    8KB

  • memory/6088-23-0x0000014066B30000-0x0000014066B52000-memory.dmp

    Filesize

    136KB

  • memory/6088-24-0x0000014066E60000-0x0000014066F1A000-memory.dmp

    Filesize

    744KB

  • memory/6088-22-0x0000014066AC0000-0x0000014066B04000-memory.dmp

    Filesize

    272KB

  • memory/6088-21-0x0000014066A80000-0x0000014066AB2000-memory.dmp

    Filesize

    200KB

  • memory/6088-26-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-25-0x0000014066100000-0x0000014066108000-memory.dmp

    Filesize

    32KB

  • memory/6088-27-0x00000140681E0000-0x000001406846E000-memory.dmp

    Filesize

    2.6MB

  • memory/6088-28-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-3-0x00000140665E0000-0x0000014066756000-memory.dmp

    Filesize

    1.5MB

  • memory/6088-30-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-31-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-32-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-33-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-1-0x000001404B530000-0x000001404BBB4000-memory.dmp

    Filesize

    6.5MB

  • memory/6088-39-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-40-0x00007FFC919B3000-0x00007FFC919B5000-memory.dmp

    Filesize

    8KB

  • memory/6088-41-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-42-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-43-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-44-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-45-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-46-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB

  • memory/6088-47-0x00007FFC919B0000-0x00007FFC92471000-memory.dmp

    Filesize

    10.8MB