Analysis
-
max time kernel
146s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:42
Behavioral task
behavioral1
Sample
271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135.exe
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
General
-
Target
271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135.exe
-
Size
158KB
-
MD5
202e3ede5006aaa516cef6af81002da6
-
SHA1
fd77cd81afef5985ab5902f507d95de8edf0161b
-
SHA256
271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135
-
SHA512
0b717b8c49451de34f28d7a94e7d2d1bba80f9f605497143e91feca64c5d8facf47185416f50cc4a7846fc25ab882bf3a74ef959361c68c50c657a6ddf761db8
-
SSDEEP
3072:i5Pto80z+vFMCnOzS9FL9sGR2uRyR7QPMtdVvuDZmXUv/KEs4aYRqfEh:iM80mniiLU7QPervuDZ3vyeRq4
Malware Config
Signatures
-
Processes:
271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135.exepid process 900 271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135.exe 900 271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135.exepid process 900 271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135.exedescription pid process Token: SeDebugPrivilege 900 271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135.exe"C:\Users\Admin\AppData\Local\Temp\271c92d4124758b378e5f0b5f3d8e96ef2f517f9b732d0a35b1113227bccf135.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:900