Analysis
-
max time kernel
198s -
max time network
210s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:32
Static task
static1
Behavioral task
behavioral1
Sample
9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exe
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
General
-
Target
9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exe
-
Size
277KB
-
MD5
a0172c1a6fed73b225f9328f48539a78
-
SHA1
7ffd8bd0a3bf5afc6eeced9b21dfcb50ad0354c9
-
SHA256
9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66
-
SHA512
c33a0039d181cb0c3fd3be1e124d256c6d38d17d32e5a3ccb3322793cbcfda1dfc05b32a71b7975e4270b28f8cd25351a464734d05baaa268034d6fbbec89630
-
SSDEEP
6144:lyaiQloEB7qq2x9dBb7G9H4es3cCB260miLKGj6yFI8ctlK5:4aLlv/2xTp7UbbYiLKGdFrI0
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
Processes:
9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exedescription ioc process File created C:\Windows\assembly\Desktop.ini 9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exe File opened for modification C:\Windows\assembly\Desktop.ini 9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exe -
Drops file in Windows directory 3 IoCs
Processes:
9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exedescription ioc process File opened for modification C:\Windows\assembly 9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exe File created C:\Windows\assembly\Desktop.ini 9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exe File opened for modification C:\Windows\assembly\Desktop.ini 9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exepid process 1332 9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exedescription pid process Token: SeDebugPrivilege 1332 9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exepid process 1332 9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exe"C:\Users\Admin\AppData\Local\Temp\9e7606f964817dff4eda3dc4dd33563bd7305d8c216d2fa8fbd1ef18437b2c66.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1332