Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2022 21:41
Static task
static1
Behavioral task
behavioral1
Sample
cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exe
Resource
win7-20220812-en
4 signatures
150 seconds
General
-
Target
cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exe
-
Size
355KB
-
MD5
83017cfd2ae1f32c9b1f25a2f3c7fc20
-
SHA1
fa4c24521d496217ba76790cd5780f77c38713f5
-
SHA256
cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9
-
SHA512
dc918c555bc7a43233e8a60ec01cf26c6137bc6656bd36eb96f55fe5f038b8262fc02fd73f9c8f71b4f6da7ff962ecb3648a38a9ac328cb62673692b2fa2c7b4
-
SSDEEP
6144:gY6yVbWCck1l9xcDZtrAcAGS1aFs/RFLob:gY6y1W61l9WjreRaSU
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
Processes:
cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exedescription ioc process File opened for modification C:\Windows\assembly\Desktop.ini cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exe File created C:\Windows\assembly\Desktop.ini cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exe -
Drops file in Windows directory 3 IoCs
Processes:
cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exedescription ioc process File opened for modification C:\Windows\assembly cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exe File created C:\Windows\assembly\Desktop.ini cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exe File opened for modification C:\Windows\assembly\Desktop.ini cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exepid process 4796 cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exedescription pid process Token: SeDebugPrivilege 4796 cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exepid process 4796 cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exe"C:\Users\Admin\AppData\Local\Temp\cb3f6eb488fc6252649319ee3a6143eea490ebffdf58ff8d52a3096c6bcbd0d9.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4796