Analysis
-
max time kernel
82s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:41
Static task
static1
Behavioral task
behavioral1
Sample
e31d4d359d53ddda96bfb92b72e7aee170c4f0bd4c05c8f9a5dda8cdba0a2952.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e31d4d359d53ddda96bfb92b72e7aee170c4f0bd4c05c8f9a5dda8cdba0a2952.exe
Resource
win10v2004-20220812-en
General
-
Target
e31d4d359d53ddda96bfb92b72e7aee170c4f0bd4c05c8f9a5dda8cdba0a2952.exe
-
Size
53KB
-
MD5
adb24c10c9773ceea5dc146b6dc8eb4a
-
SHA1
913b3d9e93ce0ca2ad515488ea65da916ed4ba8d
-
SHA256
e31d4d359d53ddda96bfb92b72e7aee170c4f0bd4c05c8f9a5dda8cdba0a2952
-
SHA512
e31ff33701f590e9c5603e13529df45e6607d67ba9bf8a222603388bd99567abc190d174de92a2191af453a8c559d07a13bef8c967ef91f39e996b7a8c4a1d41
-
SSDEEP
768:3rpexrKZCuP2uX/1UXJEZ3Fj6gfd1fWaikXPis/agtKpLDNObYY4Y9lG:3hZCs2e/1U+Z1j/lf/4pcbYY4ik
Malware Config
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
e31d4d359d53ddda96bfb92b72e7aee170c4f0bd4c05c8f9a5dda8cdba0a2952.exepid process 1244 e31d4d359d53ddda96bfb92b72e7aee170c4f0bd4c05c8f9a5dda8cdba0a2952.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
e31d4d359d53ddda96bfb92b72e7aee170c4f0bd4c05c8f9a5dda8cdba0a2952.exedescription pid process Token: SeDebugPrivilege 1244 e31d4d359d53ddda96bfb92b72e7aee170c4f0bd4c05c8f9a5dda8cdba0a2952.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e31d4d359d53ddda96bfb92b72e7aee170c4f0bd4c05c8f9a5dda8cdba0a2952.exe"C:\Users\Admin\AppData\Local\Temp\e31d4d359d53ddda96bfb92b72e7aee170c4f0bd4c05c8f9a5dda8cdba0a2952.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1244