Analysis
-
max time kernel
217s -
max time network
294s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2022, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe
Resource
win10v2004-20220812-en
General
-
Target
75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe
-
Size
4.3MB
-
MD5
a75e4e9aca59e5aa1e73be9b8ca59ecc
-
SHA1
862377715c68fbe4e012888c0f560ef6cb8e1d59
-
SHA256
75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887
-
SHA512
d6930a78b4c83cf3a3d19ade9e63410bb7027ff55ebe3cfa62d242d804bf2881c60fc2eebe049c047794fb4dc7214545b7946aca01e7d05be79e8e77b7e665ee
-
SSDEEP
98304:ouK+YFaN35LRE+AITgt4ojYDhbpaEUmk/sIiq1MtlQCtaheGgt:ou7Yo55LREd+oj6hbpaEUmA1MtSF1u
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3796 set thread context of 2184 3796 75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe 90 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3796 75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe 3796 75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe 3796 75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3796 75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3796 wrote to memory of 2184 3796 75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe 90 PID 3796 wrote to memory of 2184 3796 75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe 90 PID 3796 wrote to memory of 2184 3796 75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe 90 PID 3796 wrote to memory of 2184 3796 75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe 90 PID 3796 wrote to memory of 2184 3796 75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe 90 PID 3796 wrote to memory of 2184 3796 75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe"C:\Users\Admin\AppData\Local\Temp\75bf0d2f4ffaac97469fc8bea10b7461c0c8469b752ad3d8edd91e156417e887.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe/Processid:-c2⤵PID:2184
-