Analysis
-
max time kernel
23s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 03:43
Static task
static1
Behavioral task
behavioral1
Sample
774d0dc6d56b6a63d64a163f434f74e98abc4f664b2d27628be1ab064e97f722.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
774d0dc6d56b6a63d64a163f434f74e98abc4f664b2d27628be1ab064e97f722.exe
Resource
win10v2004-20220812-en
General
-
Target
774d0dc6d56b6a63d64a163f434f74e98abc4f664b2d27628be1ab064e97f722.exe
-
Size
66KB
-
MD5
8745dcf03ed85f9b3ded56cdb384ad4d
-
SHA1
3cc5a87f2d90147182c472a6e2076848980f7ee7
-
SHA256
774d0dc6d56b6a63d64a163f434f74e98abc4f664b2d27628be1ab064e97f722
-
SHA512
355f84f00122ff118a78974f71fe4546235ee9fa155f4b3186eaf9855b152f1be8843c08f3638cabc04286552c4a30f1a0fa042229684c38ed10b6183ddcbd5d
-
SSDEEP
768:Kmvp7iHNm18FAOSwjNr3YslxT1L9GcL0PexAGYoE+u7cibgFWj7mEZcAtK45Bc0T:fNitlOwjNrxB1L9GNip9kRh7K/4rcC
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\4C3D.tmp 774d0dc6d56b6a63d64a163f434f74e98abc4f664b2d27628be1ab064e97f722.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1652 774d0dc6d56b6a63d64a163f434f74e98abc4f664b2d27628be1ab064e97f722.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1652 774d0dc6d56b6a63d64a163f434f74e98abc4f664b2d27628be1ab064e97f722.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\774d0dc6d56b6a63d64a163f434f74e98abc4f664b2d27628be1ab064e97f722.exe"C:\Users\Admin\AppData\Local\Temp\774d0dc6d56b6a63d64a163f434f74e98abc4f664b2d27628be1ab064e97f722.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1652