Analysis
-
max time kernel
137s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18-09-2022 21:20
Static task
static1
Behavioral task
behavioral1
Sample
A.Fawzy @a_b8o_protected.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
A.Fawzy @a_b8o_protected.exe
Resource
win10v2004-20220812-en
General
-
Target
A.Fawzy @a_b8o_protected.exe
-
Size
1.7MB
-
MD5
f4512da807b988310eb2756230e30944
-
SHA1
0e4d64f83f207961576592c081dd0476e287a0ef
-
SHA256
f380744407f3c94931f72c8b3a0a884438eb08d77c96995be6dd0147fcf855bc
-
SHA512
2e6e3850e87803de3fbe666e3fa9f669c19c65a0a352b7fc3c4f9a03036fa03cde2d48f76926164d0628868d442810f57166967fb89829846212d322aff11709
-
SSDEEP
24576:hQ9u98/1Xx+nuiSgGKTdQ+iptzZDYudLDd+b1Me3kKL6M20RaIvuonXh:kITdQ+ipDcRMe3L6Mr97x
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
A.Fawzy @a_b8o_protected.exepid process 1088 A.Fawzy @a_b8o_protected.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1088-54-0x0000000004D50000-0x0000000004E56000-memory.dmp agile_net -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
A.Fawzy @a_b8o_protected.exepid process 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe 1088 A.Fawzy @a_b8o_protected.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
A.Fawzy @a_b8o_protected.exedescription pid process Token: 33 1088 A.Fawzy @a_b8o_protected.exe Token: SeIncBasePriorityPrivilege 1088 A.Fawzy @a_b8o_protected.exe Token: SeDebugPrivilege 1088 A.Fawzy @a_b8o_protected.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\d.dllFilesize
124KB
MD586517901ec66f1fadc9ce6facaea9e31
SHA19ba130c485b2f59b7b11458b06792d6346bcdc91
SHA2563b576950cff4d67a724f8df9d0db1f3f3195f54aca0cae86e9dc928cc0be022c
SHA512bdffd3784a4d4ce9f58c60dade510f06d67943475a9bb01a38e89e57486b299d7e2cd35cf22f1d295bdb3ea854c6563e4774c15fdf2726f1f9c5b10f13f5df2f
-
memory/1088-54-0x0000000004D50000-0x0000000004E56000-memory.dmpFilesize
1.0MB
-
memory/1088-58-0x00000000022A0000-0x00000000022C6000-memory.dmpFilesize
152KB
-
memory/1088-59-0x0000000074C91000-0x0000000074C93000-memory.dmpFilesize
8KB
-
memory/1088-61-0x0000000004C0B000-0x0000000004C1C000-memory.dmpFilesize
68KB
-
memory/1088-62-0x0000000004C0B000-0x0000000004C1C000-memory.dmpFilesize
68KB