Analysis
-
max time kernel
168s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 05:36
Static task
static1
Behavioral task
behavioral1
Sample
7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe
Resource
win10v2004-20221111-en
General
-
Target
7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe
-
Size
9KB
-
MD5
5a8ac8276fd31538a488f3deacb373bd
-
SHA1
0826f0798a1c617a9dae709f4ac8bfbf9d7e5e0c
-
SHA256
7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca
-
SHA512
e2a5305604eb7a7a6fa523d49a3f3316c472c4279a16c18c8d00efb61f94da46634f8b02c9a47ab4b93b56c0a7a5254dd978417d554085fb3a9dc485fc6540f1
-
SSDEEP
96:iBButsCr3ScglSzmQRFoVlrukcE2TYlnlYJnL0PBL0KffveVAGgY5HtDC2cqedFa:2B7SCBvlruV2nlYJLIBLTO/Ntycbx
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Default = "C:\\Users\\Admin\\AppData\\Roaming\\XTIcS\\ltc.exe" 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exepid process 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exedescription pid process Token: SeDebugPrivilege 1116 7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe"C:\Users\Admin\AppData\Local\Temp\7c5cf8c65c373db149295f3bfea27714b17b1e46cfa30c471a30ac4e178fd0ca.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1116