Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
31-07-2021 06:05
Behavioral task
behavioral1
Sample
76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe
-
Size
45KB
-
MD5
acea5fb0f0dd0ad6e33cedbaed6fdbd9
-
SHA1
b8c8d170b78ba0f117fc13ddb1ace03efd2a8b0b
-
SHA256
76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa
-
SHA512
adb12002574276b0357e5971d3fd9c7a9e57a3d34800693ce5f357d09f548051819376f669a1727db363566aa9574b11edb0fec89e55ac5c7df88275ac0f179b
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exepid process 1640 76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe 1640 76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exedescription pid process Token: SeDebugPrivilege 1640 76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exepid process 1640 76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe 1640 76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe"C:\Users\Admin\AppData\Local\Temp\76844c2401ac24b85e662d65f5007dc193e81df6c9493963c8e09de55f98cdfa.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1640