Analysis
-
max time kernel
28s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 16:37
Static task
static1
Behavioral task
behavioral1
Sample
fa8b9befac037bc7fd53e20d5f235cd93df6ca143a3c91bef3f5178574d530ea.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fa8b9befac037bc7fd53e20d5f235cd93df6ca143a3c91bef3f5178574d530ea.exe
Resource
win10v2004-20221111-en
General
-
Target
fa8b9befac037bc7fd53e20d5f235cd93df6ca143a3c91bef3f5178574d530ea.exe
-
Size
28KB
-
MD5
39eedb8e874a2c41be0ed31a17210be3
-
SHA1
994c36ce3b5985dfd16ac5972793ebf37fbcfb82
-
SHA256
fa8b9befac037bc7fd53e20d5f235cd93df6ca143a3c91bef3f5178574d530ea
-
SHA512
d1829aeb4db678e600d75096db8bf870d8ec09882d239be77198620019aa3eb874c52a2475f0097bf46dcb2bc9b3651358265bddd33333dd8e285d42556a5e5e
-
SSDEEP
768:szel8k+A+qm84U+YNkTFU458IzYcHeImc:s49+qzuT958lI7
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fa8b9befac037bc7fd53e20d5f235cd93df6ca143a3c91bef3f5178574d530ea.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\TempReader = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\TempFile.exe" fa8b9befac037bc7fd53e20d5f235cd93df6ca143a3c91bef3f5178574d530ea.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
fa8b9befac037bc7fd53e20d5f235cd93df6ca143a3c91bef3f5178574d530ea.exedescription pid process Token: SeDebugPrivilege 1044 fa8b9befac037bc7fd53e20d5f235cd93df6ca143a3c91bef3f5178574d530ea.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
fa8b9befac037bc7fd53e20d5f235cd93df6ca143a3c91bef3f5178574d530ea.exepid process 1044 fa8b9befac037bc7fd53e20d5f235cd93df6ca143a3c91bef3f5178574d530ea.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa8b9befac037bc7fd53e20d5f235cd93df6ca143a3c91bef3f5178574d530ea.exe"C:\Users\Admin\AppData\Local\Temp\fa8b9befac037bc7fd53e20d5f235cd93df6ca143a3c91bef3f5178574d530ea.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1044