Analysis
-
max time kernel
164s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:08
Static task
static1
Behavioral task
behavioral1
Sample
59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exe
Resource
win10v2004-20220812-en
General
-
Target
59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exe
-
Size
2.9MB
-
MD5
529a2fb135ddc73da1f302131397e419
-
SHA1
0c85734cac434841de75254f6b9315401be90527
-
SHA256
59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a
-
SHA512
717e817ac48e14b9943c4d7a2d164ceec61ef9e4ca8afc7631133cf0ea618476605e5cf4dfec0f07590fe85357f895846c01830aa54d27e035f0f063aa5f27a8
-
SSDEEP
49152:pJ63sOGPjQWWyG8mS6JhhnQVOM0f6ysS7R78UAZfL2OUhkU5vhFo3f8x:ps3PGYCOM0f66RAUVkAw8x
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exepid process 1720 59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exepid process 1720 59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exedescription pid process Token: SeDebugPrivilege 1720 59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exe"C:\Users\Admin\AppData\Local\Temp\59bfed19537315f22b04a28a9b6729019ff58f42747e5f70ec549ca3c6077f7a.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56b56700b891dfef4201931376d7bef88
SHA1b5db200e46f23f98e3179f0d34d31324a344bd7e
SHA256e1f652adbc46cfeed7eec1ef0cc88452d755e9fe79466a1b6de8de97b1e51d81
SHA5124cc1b67422507ecb77f03ea35f809b90cabdc4172343acbf76ff2b1ad37d84b51d3f20587fc410be112355b2afd28f262df71ac7e0a6519a56f1ec0c80ad8078