Analysis
-
max time kernel
188s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 16:22
Static task
static1
Behavioral task
behavioral1
Sample
ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe
Resource
win7-20221111-en
General
-
Target
ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe
-
Size
327KB
-
MD5
3e5540dd7fc5e673f68498cc90d4c3d0
-
SHA1
b5148f72e533c354b198969817c9cc96a4406a27
-
SHA256
ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65
-
SHA512
4dfad9ac5288d8bfab33022b6369d15fab4e05fcaee6460cc1063b97df994205e9ace8441fa727a9ffb21eefc6262a8d6fed64c011ee2c1289a7e0fd0d152ba1
-
SSDEEP
6144:PeXs/KPJ7bEBGxrRxa0N/1OG6je2V9ItoZTanYPFyUBFyUZtjRQP3ZQ7fBAr:PYEKh7blxzaU5uItoZTHdXBFPlR4K7fa
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exedescription pid process target process PID 4624 set thread context of 3316 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exeff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exedescription pid process Token: SeDebugPrivilege 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe Token: SeDebugPrivilege 3316 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exeff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exedescription pid process target process PID 4624 wrote to memory of 4532 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 4624 wrote to memory of 4532 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 4624 wrote to memory of 3316 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 4624 wrote to memory of 3316 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 4624 wrote to memory of 3316 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 4624 wrote to memory of 3316 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 4624 wrote to memory of 3316 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 4624 wrote to memory of 3316 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 4624 wrote to memory of 3316 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 4624 wrote to memory of 3316 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 4624 wrote to memory of 3316 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 4624 wrote to memory of 3316 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 4624 wrote to memory of 3316 4624 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 3316 wrote to memory of 4768 3316 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 3316 wrote to memory of 4768 3316 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 3316 wrote to memory of 1664 3316 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe PID 3316 wrote to memory of 1664 3316 ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe"C:\Users\Admin\AppData\Local\Temp\ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exeC:\Users\Admin\AppData\Local\Temp\ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exeC:\Users\Admin\AppData\Local\Temp\ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exeC:\Users\Admin\AppData\Local\Temp\ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe3⤵
-
C:\Users\Admin\AppData\Local\Temp\ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exeC:\Users\Admin\AppData\Local\Temp\ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\ff4e102f1ad1544c9ea50d5d109ddbf19c509055a96c7b6c0df97bd08206ea65.exe.logFilesize
224B
MD51e4f2a29e11dead55e61329942cd2b14
SHA14b3ec9b98797d2f734d67b47cc149546f21cf0af
SHA25628bbb0da12bd69adc9df324c01392655b788115aba7466f02c23e1ba09f789d4
SHA5122e28227d898486bfe1cea081df486464b214df50500786e30d6ee9e7d6391f3aacd2f1ed1d0eab60d518bbc79f20f32c226f00ffd70abfe9af45a746cb08416c
-
memory/3316-133-0x0000000000000000-mapping.dmp
-
memory/3316-134-0x00007FF895120000-0x00007FF895B56000-memory.dmpFilesize
10.2MB
-
memory/4624-132-0x00007FF895120000-0x00007FF895B56000-memory.dmpFilesize
10.2MB