Analysis
-
max time kernel
35s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:52
Behavioral task
behavioral1
Sample
af1c20caffd800825fbeb8b4edff23e6ce904b5aad36fd299ccb16c43830e79a.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
af1c20caffd800825fbeb8b4edff23e6ce904b5aad36fd299ccb16c43830e79a.exe
-
Size
330KB
-
MD5
c1497c2d84f77003ea749febc992a5ed
-
SHA1
44ed6f592012ecc9063c195d6ea8aa72e3a55ea1
-
SHA256
af1c20caffd800825fbeb8b4edff23e6ce904b5aad36fd299ccb16c43830e79a
-
SHA512
5b42780c47914ca131e05731e86960169c58451f4c3be499eb44082d08de2617046b9e1e74ea6d72b9f10f00e75301dcd358a79ead2b2c739ad00c8ba3915d03
-
SSDEEP
6144:YZNwWJymYhMdhS2ykJhy93niZLt6mBBbU9D9u1Z81HyDAl7wZzsy:SNw4CqykJhmiiKo9+0gAlA
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1452-55-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral1/memory/1452-56-0x0000000000400000-0x00000000004DB000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
af1c20caffd800825fbeb8b4edff23e6ce904b5aad36fd299ccb16c43830e79a.exedescription pid process Token: SeDebugPrivilege 1452 af1c20caffd800825fbeb8b4edff23e6ce904b5aad36fd299ccb16c43830e79a.exe