Analysis
-
max time kernel
50s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 07:43
Static task
static1
Behavioral task
behavioral1
Sample
8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe
Resource
win10v2004-20220812-en
General
-
Target
8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe
-
Size
373KB
-
MD5
449b01885bdc422df5db8fba9f3b35f6
-
SHA1
3cd4b7e51d2e97d377e558741219972f7417cfc6
-
SHA256
8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed
-
SHA512
629ddada620ef75f33b3c6d76e1d4f980cfcf93ac8e6d499ac20864dc3e4d716b8926a151304d0fdc6c095ae751c8599e947b67306f3c71812d324dcc0930072
-
SSDEEP
6144:Rsk//5YqSLwdhvCxvK+zB0n4bs5E1r0uKmP9j4yS8Vb6XG9MYFLI1bT2mrww:6k//+LWhvCKA042ERtmN8Vb6XYBF01bv
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exedescription pid process target process PID 2004 set thread context of 1656 2004 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exepid process 2004 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe 1656 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exedescription pid process Token: SeDebugPrivilege 2004 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe Token: SeDebugPrivilege 1656 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exedescription pid process target process PID 2004 wrote to memory of 1656 2004 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe PID 2004 wrote to memory of 1656 2004 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe PID 2004 wrote to memory of 1656 2004 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe PID 2004 wrote to memory of 1656 2004 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe PID 2004 wrote to memory of 1656 2004 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe PID 2004 wrote to memory of 1656 2004 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe PID 2004 wrote to memory of 1656 2004 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe PID 2004 wrote to memory of 1656 2004 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe PID 2004 wrote to memory of 1656 2004 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe 8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe"C:\Users\Admin\AppData\Local\Temp\8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe"C:\Users\Admin\AppData\Local\Temp\8dd9a88624d1060766e6bcc594de63105aaab3a7be0f52fb83247cc2ad4c10ed.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656