Analysis
-
max time kernel
179s -
max time network
219s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 20:05
Static task
static1
Behavioral task
behavioral1
Sample
bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe
Resource
win7-20221111-en
windows7-x64
6 signatures
150 seconds
General
-
Target
bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe
-
Size
360KB
-
MD5
05913e5289fc594fa0310c18ea3bf5ea
-
SHA1
ac22cfda659d5b3b82ae722a80267e98c783bace
-
SHA256
bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3
-
SHA512
9eaf659a3a716d1c1d7749806fb7f05e5ce9dd9d73e39ff7e39141f9adb0423faddc36a361cc43942561919bd74dbf11a531c1252ce2b5ce64ed68dd8f36e468
-
SSDEEP
6144:FxRJhefWh/iWtRrDYETct/ph68Gpfz4t/riXBfuBdAPMq:hJtRr8XH6D741OxGvI
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 564 2028 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe 28 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 564 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2028 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe Token: SeDebugPrivilege 564 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 564 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2028 wrote to memory of 564 2028 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe 28 PID 2028 wrote to memory of 564 2028 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe 28 PID 2028 wrote to memory of 564 2028 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe 28 PID 2028 wrote to memory of 564 2028 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe 28 PID 2028 wrote to memory of 564 2028 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe 28 PID 2028 wrote to memory of 564 2028 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe 28 PID 2028 wrote to memory of 564 2028 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe 28 PID 2028 wrote to memory of 564 2028 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe 28 PID 2028 wrote to memory of 564 2028 bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe"C:\Users\Admin\AppData\Local\Temp\bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe"C:\Users\Admin\AppData\Local\Temp\bb79ba3ae3ea4f63d06f5949c207ba98ba49680fcf08175073b712349b471ce3.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:564
-