Analysis
-
max time kernel
40s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe
Resource
win10v2004-20220812-en
General
-
Target
b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe
-
Size
196KB
-
MD5
220e0f073e1d21384173ebd1a4effcd7
-
SHA1
3d69fa68f2cdcab36e4628cd27cc698147fcbc22
-
SHA256
b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c
-
SHA512
2da3a527cdc44e4ced9b4177782a6fad17717449fca0c1d89af9460c5e8dc67422aa782b1d814a46bfa37241cd3d5da6e80a5f936f1dfbf11a79413f23135b4d
-
SSDEEP
3072:LRttuKltqdWJMNKLlo0+y+Lh+1SCxCcE91BbY4vnxgLQdkXstxwckBwkRQrewcxV:V3Pex0B1SAO5WLQdkT5Gq50AxNhE/KX
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe Token: SeDebugPrivilege 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2004 wrote to memory of 1188 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 15 PID 2004 wrote to memory of 260 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 7 PID 2004 wrote to memory of 332 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 6 PID 2004 wrote to memory of 368 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 5 PID 2004 wrote to memory of 380 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 4 PID 2004 wrote to memory of 416 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 3 PID 2004 wrote to memory of 460 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 2 PID 2004 wrote to memory of 476 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 1 PID 2004 wrote to memory of 484 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 27 PID 2004 wrote to memory of 584 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 26 PID 2004 wrote to memory of 664 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 25 PID 2004 wrote to memory of 740 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 24 PID 2004 wrote to memory of 800 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 23 PID 2004 wrote to memory of 836 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 22 PID 2004 wrote to memory of 860 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 21 PID 2004 wrote to memory of 240 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 20 PID 2004 wrote to memory of 340 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 19 PID 2004 wrote to memory of 1064 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 18 PID 2004 wrote to memory of 1108 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 17 PID 2004 wrote to memory of 1152 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 16 PID 2004 wrote to memory of 304 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 13 PID 2004 wrote to memory of 600 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 12 PID 2004 wrote to memory of 1916 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 11 PID 2004 wrote to memory of 1988 2004 b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe 9
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:600
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:304
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1108
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1064
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:340
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:240
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:860
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:836
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:800
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:740
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:664
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:584
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe"C:\Users\Admin\AppData\Local\Temp\b671586adf34c6d0547fc988a5f1e0443b1bddbc3b0239d24e940fdd07e63f1c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1916
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1152