Analysis
-
max time kernel
36s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 03:06
Behavioral task
behavioral1
Sample
363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2.exe
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2.exe
-
Size
240KB
-
MD5
92a7b70db9c11c4bb6119ace37f6eadd
-
SHA1
7b877162b3547988943c441005248014fa1df9f2
-
SHA256
363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2
-
SHA512
193abd992ec19d40e4e6ee8f3d70f72a4e59258940b86cbe9b3499ea2943f1099be27a97824a3aec613d6c3dc2dcc8a178c6a940df5b3a67d1251b3e0712b122
-
SSDEEP
6144:SjzOsQW35/dR+SOVTSOqZCxbLGcRE5I5t7k6vQka5u:h+vUS2WOqkxbCcRE5L6vQka5
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1788-55-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral1/memory/1788-56-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\svchost.vir 363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2.exe File opened for modification \??\c:\windows\SysWOW64\alg.exe 363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2.exe File opened for modification \??\c:\windows\SysWOW64\svchost.exe 363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe 363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1788 363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2.exe"C:\Users\Admin\AppData\Local\Temp\363c5652d9d884af4acd5274bbafedb86149f34eb3f91fe9f72ec42ff1ee72a2.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1788