Analysis
-
max time kernel
157s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 13:37
Static task
static1
Behavioral task
behavioral1
Sample
0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe
Resource
win10v2004-20220812-en
General
-
Target
0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe
-
Size
231KB
-
MD5
5493afff685719b09cb135f27c237dd0
-
SHA1
def43e58679be5742104de3eb50f90447cc46463
-
SHA256
0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f
-
SHA512
9f318b1ddb88252acd3bca43ad5e6c7837556da43f61ae3843c71188fccb634be4d73164697d3604d6174e747c12bb4a1a01b7a4a2bfa683cd8c8d3c0037ea00
-
SSDEEP
6144:x4Rm3MhPgYFNuyEqs3uqPD9k9vK78pF/jOIj:x4RRhYYhERPPD8vK47KI
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1440 wrote to memory of 4964 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 81 PID 1440 wrote to memory of 4964 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 81 PID 1440 wrote to memory of 4964 1440 0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe"C:\Users\Admin\AppData\Local\Temp\0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe"C:\Users\Admin\AppData\Local\Temp\0598bac7ca1d0f2aa27167d0bc3d89140e3e8742d6e6caa09646e0f13940527f.exe"2⤵PID:4964
-