Analysis
-
max time kernel
149s -
max time network
180s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
29-01-2022 14:25
Static task
static1
Behavioral task
behavioral1
Sample
0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exe
-
Size
96KB
-
MD5
f078b5aeaf73831361ecd96a069c9f50
-
SHA1
18607b8eae4c762e30f743ffef000c717077ea5c
-
SHA256
0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7
-
SHA512
863cf0d7ab2420b88c31b4162a9b4605fdafb1fe3dd84df981c4e6dc80148e0aa915a6648900d88461f0c268d21b37d9aa67dfcd5f4e66e30c9b15e74af73355
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows\CurrentVersion\Run\msoclient = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft-Security\\msoclient.exe" 0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exepid Process 2720 0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exe 2720 0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exe 2720 0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exe 2720 0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exe 2720 0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exe 2720 0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exedescription pid Process Token: SeDebugPrivilege 2720 0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exe"C:\Users\Admin\AppData\Local\Temp\0638cdef52fd46ad9f6d9064be686e6aecf48b0ea26db6eb28c2954a510479c7.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720