Analysis
-
max time kernel
118s -
max time network
117s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
13-05-2021 12:57
Static task
static1
Behavioral task
behavioral1
Sample
58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exe
-
Size
1.1MB
-
MD5
349402fe8b5475ad015a30c451159102
-
SHA1
9ec68a4dae92a29ed974431e79219d431122e85d
-
SHA256
58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44
-
SHA512
e49c8d032eb23c0534af7859d4b394b80fa059741077357152c34540ec554bd873d89d82c252f30435f980f20851dcbe61f6490d91607aa17afb4621a635d897
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exepid process 1048 58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exe 1048 58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exepid process 1048 58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exedescription pid process Token: SeDebugPrivilege 1048 58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exepid process 1048 58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exe 1048 58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exe"C:\Users\Admin\AppData\Local\Temp\58e41597206ece15ec19dc6f5f8614be6d0fc4dde38e603b7812f6eaedf58e44.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1048-59-0x0000000075721000-0x0000000075723000-memory.dmpFilesize
8KB