Analysis
-
max time kernel
131s -
max time network
145s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
04-05-2021 10:06
Static task
static1
Behavioral task
behavioral1
Sample
ED7251FADEB9BD2A8836828F2E1B6F83.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
ED7251FADEB9BD2A8836828F2E1B6F83.exe
-
Size
992KB
-
MD5
ed7251fadeb9bd2a8836828f2e1b6f83
-
SHA1
ab41a68d76147bfdb3d5ff36ae0e992e4e5b7c84
-
SHA256
dab16f86762edfad407ad17ff640eeaf0b92ef8da877d81e07c90690d142df88
-
SHA512
afd69b80a2dc68bd4b2aac2850504c6dde1e43fe19f0cfc16283814ce362aaccfe9a2023357bcd55d5f3ea2da013b80309d223fe0235788b3a1265d8f4e637d0
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1448-62-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/memory/1448-65-0x0000000000400000-0x00000000004A8000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ED7251FADEB9BD2A8836828F2E1B6F83.exedescription pid process target process PID 1944 set thread context of 1448 1944 ED7251FADEB9BD2A8836828F2E1B6F83.exe ED7251FADEB9BD2A8836828F2E1B6F83.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
ED7251FADEB9BD2A8836828F2E1B6F83.exepid process 1448 ED7251FADEB9BD2A8836828F2E1B6F83.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ED7251FADEB9BD2A8836828F2E1B6F83.exedescription pid process Token: SeDebugPrivilege 1944 ED7251FADEB9BD2A8836828F2E1B6F83.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ED7251FADEB9BD2A8836828F2E1B6F83.exedescription pid process target process PID 1944 wrote to memory of 1448 1944 ED7251FADEB9BD2A8836828F2E1B6F83.exe ED7251FADEB9BD2A8836828F2E1B6F83.exe PID 1944 wrote to memory of 1448 1944 ED7251FADEB9BD2A8836828F2E1B6F83.exe ED7251FADEB9BD2A8836828F2E1B6F83.exe PID 1944 wrote to memory of 1448 1944 ED7251FADEB9BD2A8836828F2E1B6F83.exe ED7251FADEB9BD2A8836828F2E1B6F83.exe PID 1944 wrote to memory of 1448 1944 ED7251FADEB9BD2A8836828F2E1B6F83.exe ED7251FADEB9BD2A8836828F2E1B6F83.exe PID 1944 wrote to memory of 1448 1944 ED7251FADEB9BD2A8836828F2E1B6F83.exe ED7251FADEB9BD2A8836828F2E1B6F83.exe PID 1944 wrote to memory of 1448 1944 ED7251FADEB9BD2A8836828F2E1B6F83.exe ED7251FADEB9BD2A8836828F2E1B6F83.exe PID 1944 wrote to memory of 1448 1944 ED7251FADEB9BD2A8836828F2E1B6F83.exe ED7251FADEB9BD2A8836828F2E1B6F83.exe PID 1944 wrote to memory of 1448 1944 ED7251FADEB9BD2A8836828F2E1B6F83.exe ED7251FADEB9BD2A8836828F2E1B6F83.exe PID 1944 wrote to memory of 1448 1944 ED7251FADEB9BD2A8836828F2E1B6F83.exe ED7251FADEB9BD2A8836828F2E1B6F83.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ED7251FADEB9BD2A8836828F2E1B6F83.exe"C:\Users\Admin\AppData\Local\Temp\ED7251FADEB9BD2A8836828F2E1B6F83.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\ED7251FADEB9BD2A8836828F2E1B6F83.exeC:\Users\Admin\AppData\Local\Temp\ED7251FADEB9BD2A8836828F2E1B6F83.exe2⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1448
-