Analysis
-
max time kernel
164s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 17:45
Static task
static1
Behavioral task
behavioral1
Sample
e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe
Resource
win7-20220901-en
6 signatures
150 seconds
General
-
Target
e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe
-
Size
357KB
-
MD5
5d33a85ccd32c26cea63271d7d497699
-
SHA1
48390a5adfdba3b019f6ae4e26244e69fcf3e7df
-
SHA256
e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87
-
SHA512
2a8120747b3a9de486749f9c51cd1143040729d3081cc5004c7d328091953e9b0cea2f2682e19f8246526548c84ffecc603fe05053b2e16bc0a21a832c74d9a2
-
SSDEEP
6144:DOkup+5C3nhWVKktZDsb2ia/ANgzo8Ts2Bjl9sIWZgSSBUIxnvGHg1kDv7xrfUL:DjupKC3cgOZwbUYGz3sYlmBI/cg1kXGL
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe File opened for modification C:\Windows\assembly\Desktop.ini e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4408 set thread context of 868 4408 e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe 86 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe File opened for modification C:\Windows\assembly\Desktop.ini e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe File opened for modification C:\Windows\assembly e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 868 e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4408 e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe Token: SeDebugPrivilege 868 e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 868 e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4408 wrote to memory of 868 4408 e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe 86 PID 4408 wrote to memory of 868 4408 e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe 86 PID 4408 wrote to memory of 868 4408 e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe 86 PID 4408 wrote to memory of 868 4408 e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe 86 PID 4408 wrote to memory of 868 4408 e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe 86 PID 4408 wrote to memory of 868 4408 e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe 86 PID 4408 wrote to memory of 868 4408 e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe 86 PID 4408 wrote to memory of 868 4408 e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe"C:\Users\Admin\AppData\Local\Temp\e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe"C:\Users\Admin\AppData\Local\Temp\e54c74deca5eeff06fccd04fb65ce844c85c99e3c04edac8e84af3d2484e7e87.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:868
-