Analysis
-
max time kernel
3s -
max time network
40s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
11-08-2021 19:37
Static task
static1
Behavioral task
behavioral1
Sample
753C707E47BCE65D32BE781EA1584E0B.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
753C707E47BCE65D32BE781EA1584E0B.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
753C707E47BCE65D32BE781EA1584E0B.exe
-
Size
84KB
-
MD5
753c707e47bce65d32be781ea1584e0b
-
SHA1
7b43f6a910b01553dfae51560570365e3ce9ed42
-
SHA256
b1c0e35f47273a236518f43ee56c0367d8b423ca9ed8f9e7ad4a875caa47bb69
-
SHA512
8afc2ebbc80e17e42317202e9479e0c223456cf9f0b22ccdf9fe486eff19ebf9a33a2e00c01aa81168d4ad9950c34c8d78dc2f5821702fe61874221088d3cdda
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
753C707E47BCE65D32BE781EA1584E0B.exedescription pid process target process PID 1080 set thread context of 1484 1080 753C707E47BCE65D32BE781EA1584E0B.exe 753C707E47BCE65D32BE781EA1584E0B.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
753C707E47BCE65D32BE781EA1584E0B.exedescription pid process Token: SeDebugPrivilege 1080 753C707E47BCE65D32BE781EA1584E0B.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
753C707E47BCE65D32BE781EA1584E0B.exedescription pid process target process PID 1080 wrote to memory of 1484 1080 753C707E47BCE65D32BE781EA1584E0B.exe 753C707E47BCE65D32BE781EA1584E0B.exe PID 1080 wrote to memory of 1484 1080 753C707E47BCE65D32BE781EA1584E0B.exe 753C707E47BCE65D32BE781EA1584E0B.exe PID 1080 wrote to memory of 1484 1080 753C707E47BCE65D32BE781EA1584E0B.exe 753C707E47BCE65D32BE781EA1584E0B.exe PID 1080 wrote to memory of 1484 1080 753C707E47BCE65D32BE781EA1584E0B.exe 753C707E47BCE65D32BE781EA1584E0B.exe PID 1080 wrote to memory of 1484 1080 753C707E47BCE65D32BE781EA1584E0B.exe 753C707E47BCE65D32BE781EA1584E0B.exe PID 1080 wrote to memory of 1484 1080 753C707E47BCE65D32BE781EA1584E0B.exe 753C707E47BCE65D32BE781EA1584E0B.exe PID 1080 wrote to memory of 1484 1080 753C707E47BCE65D32BE781EA1584E0B.exe 753C707E47BCE65D32BE781EA1584E0B.exe PID 1080 wrote to memory of 1484 1080 753C707E47BCE65D32BE781EA1584E0B.exe 753C707E47BCE65D32BE781EA1584E0B.exe PID 1080 wrote to memory of 1484 1080 753C707E47BCE65D32BE781EA1584E0B.exe 753C707E47BCE65D32BE781EA1584E0B.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\753C707E47BCE65D32BE781EA1584E0B.exe"C:\Users\Admin\AppData\Local\Temp\753C707E47BCE65D32BE781EA1584E0B.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\753C707E47BCE65D32BE781EA1584E0B.exeC:\Users\Admin\AppData\Local\Temp\753C707E47BCE65D32BE781EA1584E0B.exe2⤵PID:1484
-