Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
38c89c2edcaba572c1b7380085206e6bba5a54151cd0c68e0af85798dc94966a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
38c89c2edcaba572c1b7380085206e6bba5a54151cd0c68e0af85798dc94966a.exe
Resource
win10v2004-20220901-en
General
-
Target
38c89c2edcaba572c1b7380085206e6bba5a54151cd0c68e0af85798dc94966a.exe
-
Size
193KB
-
MD5
3d01cbdcc93c690f398ee81d3cf388c0
-
SHA1
e974be20c5a8fbc1a9ae8e017efce6810618ed7d
-
SHA256
38c89c2edcaba572c1b7380085206e6bba5a54151cd0c68e0af85798dc94966a
-
SHA512
6a41d64d813fc75bdb4597489866386f12c112514312e306d4e5931439cdd5b8c981034198925f6a96b6ca42d10d023cacdfc076bfb83da2f60b574ffb689600
-
SSDEEP
6144:s18CRRVMMMMMM2MMMMMCXBf95+RdGnRsG/O:s1zRRaMMMMM2MMMMMOFnCGm
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 38c89c2edcaba572c1b7380085206e6bba5a54151cd0c68e0af85798dc94966a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1600 38c89c2edcaba572c1b7380085206e6bba5a54151cd0c68e0af85798dc94966a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38c89c2edcaba572c1b7380085206e6bba5a54151cd0c68e0af85798dc94966a.exe"C:\Users\Admin\AppData\Local\Temp\38c89c2edcaba572c1b7380085206e6bba5a54151cd0c68e0af85798dc94966a.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1600