Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 00:21
Behavioral task
behavioral1
Sample
f20d9fb3a134c162ea017efd10b55dc4f6de756fdb694e7407194b982bd0e542.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f20d9fb3a134c162ea017efd10b55dc4f6de756fdb694e7407194b982bd0e542.exe
Resource
win10v2004-20220901-en
General
-
Target
f20d9fb3a134c162ea017efd10b55dc4f6de756fdb694e7407194b982bd0e542.exe
-
Size
167KB
-
MD5
7d1a3915029448eeb89eb62cbceeff1d
-
SHA1
d608a615a5f13f357fc84373cd5da137d11637b6
-
SHA256
f20d9fb3a134c162ea017efd10b55dc4f6de756fdb694e7407194b982bd0e542
-
SHA512
f052b8a8c11e685004dad49684a62fbf24100e7855fd044a2e6bcacd4c4973169560c8396f0b42453667d960fb615aca55103a09a365bb4b242641fdcf21109d
-
SSDEEP
3072:mqV6CcF9R/dMMMMMM2MMMMM+FAstGU6ogUb82DS+IAWo64X5wQF84VVTyeeVy44f:mq8CaRVMMMMMM2MMMMMWGG38GSJ4Jw50
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2000-54-0x0000000001000000-0x0000000001053000-memory.dmp upx behavioral1/memory/2000-56-0x0000000001000000-0x0000000001053000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\SysWOW64\alg.exe f20d9fb3a134c162ea017efd10b55dc4f6de756fdb694e7407194b982bd0e542.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe f20d9fb3a134c162ea017efd10b55dc4f6de756fdb694e7407194b982bd0e542.exe File created \??\c:\windows\SysWOW64\svchost.vir f20d9fb3a134c162ea017efd10b55dc4f6de756fdb694e7407194b982bd0e542.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe f20d9fb3a134c162ea017efd10b55dc4f6de756fdb694e7407194b982bd0e542.exe File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe f20d9fb3a134c162ea017efd10b55dc4f6de756fdb694e7407194b982bd0e542.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2000 f20d9fb3a134c162ea017efd10b55dc4f6de756fdb694e7407194b982bd0e542.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f20d9fb3a134c162ea017efd10b55dc4f6de756fdb694e7407194b982bd0e542.exe"C:\Users\Admin\AppData\Local\Temp\f20d9fb3a134c162ea017efd10b55dc4f6de756fdb694e7407194b982bd0e542.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2000