Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 16:00
Behavioral task
behavioral1
Sample
2c3120e6df13d7c6a167774fd8037cc5e82301691e22fae183e1bf87592f75b3.exe
Resource
win7-20220901-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c3120e6df13d7c6a167774fd8037cc5e82301691e22fae183e1bf87592f75b3.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
2c3120e6df13d7c6a167774fd8037cc5e82301691e22fae183e1bf87592f75b3.exe
-
Size
71KB
-
MD5
1fe8ec2db89fb8117c812349ffea8611
-
SHA1
4fe8a31d81f4a646b65cfd7177f1c980c38644c9
-
SHA256
2c3120e6df13d7c6a167774fd8037cc5e82301691e22fae183e1bf87592f75b3
-
SHA512
cc2613acc464bbb787bb16328f5e1e24fb20eb0bbda90978bba6d1a7a69b4671dfb9d8f351d88f42556792ba2c3b83ec0eb9331286adba462723e57b77e1e67a
-
SSDEEP
1536:Bgc+yFQxY/1JX/k3zSpwpc5hE/1TgISM38AZ27k8TSJ6:BsyqxY/jgzO2/tgIjf2xs6
Score
8/10
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\HideSys.sys 2c3120e6df13d7c6a167774fd8037cc5e82301691e22fae183e1bf87592f75b3.exe -
resource yara_rule behavioral1/memory/1204-55-0x0000000000400000-0x0000000000433000-memory.dmp upx -
Suspicious behavior: LoadsDriver 10 IoCs
pid Process 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1204 2c3120e6df13d7c6a167774fd8037cc5e82301691e22fae183e1bf87592f75b3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1288 1204 2c3120e6df13d7c6a167774fd8037cc5e82301691e22fae183e1bf87592f75b3.exe 12 PID 1204 wrote to memory of 1288 1204 2c3120e6df13d7c6a167774fd8037cc5e82301691e22fae183e1bf87592f75b3.exe 12 PID 1204 wrote to memory of 1288 1204 2c3120e6df13d7c6a167774fd8037cc5e82301691e22fae183e1bf87592f75b3.exe 12 PID 1204 wrote to memory of 1288 1204 2c3120e6df13d7c6a167774fd8037cc5e82301691e22fae183e1bf87592f75b3.exe 12
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\2c3120e6df13d7c6a167774fd8037cc5e82301691e22fae183e1bf87592f75b3.exe"C:\Users\Admin\AppData\Local\Temp\2c3120e6df13d7c6a167774fd8037cc5e82301691e22fae183e1bf87592f75b3.exe"2⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204
-