Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2022, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
747bba0127057b80f77bec905024625cadc452c8020da8ee48bb6bbadd7ab8cb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
747bba0127057b80f77bec905024625cadc452c8020da8ee48bb6bbadd7ab8cb.exe
Resource
win10v2004-20220812-en
General
-
Target
747bba0127057b80f77bec905024625cadc452c8020da8ee48bb6bbadd7ab8cb.exe
-
Size
473KB
-
MD5
0ef9e075eeb1e34d0dc76662c98cd740
-
SHA1
83017a2a9db9ef119b11f6f0e70f42c9c0806b7a
-
SHA256
747bba0127057b80f77bec905024625cadc452c8020da8ee48bb6bbadd7ab8cb
-
SHA512
3add9cabd03edd6af6a1a8a26a068b4ffc554219eebab43359e6a0543958b0d6cea794ad1ab1748e674d5ea6691e456304eb04fca9aa61291eb46150e306db2f
-
SSDEEP
6144:0cv0XjJgmx9jfumGiKW+s+9H/WdLb9lJ9uE7qBdVb4Q2uOpgKFQKPY:0cQGHJDfuX939u/Bn3OBHw
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 747bba0127057b80f77bec905024625cadc452c8020da8ee48bb6bbadd7ab8cb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4812 747bba0127057b80f77bec905024625cadc452c8020da8ee48bb6bbadd7ab8cb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\747bba0127057b80f77bec905024625cadc452c8020da8ee48bb6bbadd7ab8cb.exe"C:\Users\Admin\AppData\Local\Temp\747bba0127057b80f77bec905024625cadc452c8020da8ee48bb6bbadd7ab8cb.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4812