Analysis
-
max time kernel
54s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
07-07-2022 07:13
Static task
static1
Behavioral task
behavioral1
Sample
ce624fe3d11cd5dfe05d262a43ef53b9.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
ce624fe3d11cd5dfe05d262a43ef53b9.exe
-
Size
526KB
-
MD5
ce624fe3d11cd5dfe05d262a43ef53b9
-
SHA1
fb7e4789a48ea2613229c63c7426ed74c53a8b07
-
SHA256
02ec85e897519787b0939d830a0a91144c1e50857c1ea9c18d313cd95e68e939
-
SHA512
69146652ff5196f5ec7a243f0e9eff72a1f97d123b3633b297379dec727e9f7eea5ada7b0998b6dc17ea00e075ec724461ce6ec2fcf9a7dc0a06333a07a9a8ed
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
ce624fe3d11cd5dfe05d262a43ef53b9.exepid process 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ce624fe3d11cd5dfe05d262a43ef53b9.exedescription pid process Token: SeDebugPrivilege 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
ce624fe3d11cd5dfe05d262a43ef53b9.exedescription pid process target process PID 656 wrote to memory of 960 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 960 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 960 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 960 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 948 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 948 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 948 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 948 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 1704 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 1704 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 1704 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 1704 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 1104 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 1104 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 1104 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 1104 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 1108 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 1108 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 1108 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe PID 656 wrote to memory of 1108 656 ce624fe3d11cd5dfe05d262a43ef53b9.exe ce624fe3d11cd5dfe05d262a43ef53b9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce624fe3d11cd5dfe05d262a43ef53b9.exe"C:\Users\Admin\AppData\Local\Temp\ce624fe3d11cd5dfe05d262a43ef53b9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Users\Admin\AppData\Local\Temp\ce624fe3d11cd5dfe05d262a43ef53b9.exe"C:\Users\Admin\AppData\Local\Temp\ce624fe3d11cd5dfe05d262a43ef53b9.exe"2⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\ce624fe3d11cd5dfe05d262a43ef53b9.exe"C:\Users\Admin\AppData\Local\Temp\ce624fe3d11cd5dfe05d262a43ef53b9.exe"2⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\ce624fe3d11cd5dfe05d262a43ef53b9.exe"C:\Users\Admin\AppData\Local\Temp\ce624fe3d11cd5dfe05d262a43ef53b9.exe"2⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\ce624fe3d11cd5dfe05d262a43ef53b9.exe"C:\Users\Admin\AppData\Local\Temp\ce624fe3d11cd5dfe05d262a43ef53b9.exe"2⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\ce624fe3d11cd5dfe05d262a43ef53b9.exe"C:\Users\Admin\AppData\Local\Temp\ce624fe3d11cd5dfe05d262a43ef53b9.exe"2⤵PID:1108