Analysis
-
max time kernel
62s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
5d0bc1622613432799a5807951e6bb882b046348bd49a2675d0ad115a569a6a9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d0bc1622613432799a5807951e6bb882b046348bd49a2675d0ad115a569a6a9.exe
Resource
win10v2004-20220812-en
General
-
Target
5d0bc1622613432799a5807951e6bb882b046348bd49a2675d0ad115a569a6a9.exe
-
Size
37KB
-
MD5
64b5ce364e39509d9d8ba5efb7e58fd0
-
SHA1
6978865132aa7c17615c7077fa35089df4838f72
-
SHA256
5d0bc1622613432799a5807951e6bb882b046348bd49a2675d0ad115a569a6a9
-
SHA512
f9d43f943c1f5a22a890c52fec022d5698ea035578d8d4c6d86ec3b1e29e043fc151626876d88b105f85ec59cefc1cb163b60ccfb0b2e09bd5de0f4eee63c122
-
SSDEEP
768:th/z7+z2f+8etdxdA4OBLh/PtMGQS1ixa7XRNmdaMoqO:th/zC27eHA4OBLtPtFzXRNSXoq
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ir32_a.exe 5d0bc1622613432799a5807951e6bb882b046348bd49a2675d0ad115a569a6a9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1096 5d0bc1622613432799a5807951e6bb882b046348bd49a2675d0ad115a569a6a9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1096 5d0bc1622613432799a5807951e6bb882b046348bd49a2675d0ad115a569a6a9.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1096 wrote to memory of 1276 1096 5d0bc1622613432799a5807951e6bb882b046348bd49a2675d0ad115a569a6a9.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\5d0bc1622613432799a5807951e6bb882b046348bd49a2675d0ad115a569a6a9.exe"C:\Users\Admin\AppData\Local\Temp\5d0bc1622613432799a5807951e6bb882b046348bd49a2675d0ad115a569a6a9.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096
-