Analysis
-
max time kernel
172s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 22:32
Static task
static1
Behavioral task
behavioral1
Sample
8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe
Resource
win7-20221111-en
3 signatures
150 seconds
General
-
Target
8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe
-
Size
344KB
-
MD5
84866da712b155de8583f2d9c6c7cb27
-
SHA1
cd72640042662c3aeb764a9375ffac0ccb2902dd
-
SHA256
8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591
-
SHA512
d82b35e1682fdffbf84d19f56f0240026f324696ad43aedc568aa65cac817c69d548dc19b2fa88956527ab798b5e49eceae7bce1f3d007bdf612b323cd31de66
-
SSDEEP
6144:xW2RCb06IaEabByIJTfy6tpCBpLaHGaqgtrLBmsFMSLGWnWsJ38nKS19Pi:xW20IaEabAKTfya0QGktrEf0WfKk1
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe File opened for modification C:\Windows\assembly\Desktop.ini 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5008 set thread context of 3500 5008 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe 84 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe File created C:\Windows\assembly\Desktop.ini 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe File opened for modification C:\Windows\assembly\Desktop.ini 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3500 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5008 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe Token: SeDebugPrivilege 3500 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3500 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5008 wrote to memory of 3500 5008 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe 84 PID 5008 wrote to memory of 3500 5008 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe 84 PID 5008 wrote to memory of 3500 5008 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe 84 PID 5008 wrote to memory of 3500 5008 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe 84 PID 5008 wrote to memory of 3500 5008 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe 84 PID 5008 wrote to memory of 3500 5008 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe 84 PID 5008 wrote to memory of 3500 5008 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe 84 PID 5008 wrote to memory of 3500 5008 8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe"C:\Users\Admin\AppData\Local\Temp\8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe"C:\Users\Admin\AppData\Local\Temp\8ba2a5ccabc2d17336d294a7288fd66375db6694596052ce79a73d5c1923d591.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3500
-