Analysis
-
max time kernel
9s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
23-11-2020 13:48
Static task
static1
Behavioral task
behavioral1
Sample
4yGRcXEf.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
4yGRcXEf.exe
-
Size
209KB
-
MD5
87e77797615466baa21cde3f7bb347f2
-
SHA1
9cd228af2ea1f503fe76ed0ead2cfaab8ce7f08a
-
SHA256
d50a35f05df59b5b35e07dd204e5312629b3670b09da6801c56f89c5aef8ff6b
-
SHA512
cb88a2bfffec3ba7002e7d845e9d40f78285b822f17c24c21ec8c34ea488546466b4f1cddbed355f124dd8443004deb34d02dce3a7a6e591c4f2590d1858c58c
Malware Config
Signatures
-
Processes:
4yGRcXEf.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4yGRcXEf.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
4yGRcXEf.exepid process 1808 4yGRcXEf.exe 1808 4yGRcXEf.exe 1808 4yGRcXEf.exe 1808 4yGRcXEf.exe 1808 4yGRcXEf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
4yGRcXEf.exepid process 1808 4yGRcXEf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
4yGRcXEf.exedescription pid process Token: SeDebugPrivilege 1808 4yGRcXEf.exe