Analysis
-
max time kernel
168s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 00:28
Static task
static1
Behavioral task
behavioral1
Sample
66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe
Resource
win7-20221111-en
6 signatures
150 seconds
General
-
Target
66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe
-
Size
380KB
-
MD5
67b20aa2e0955043699dc6011f0f4b42
-
SHA1
c3d331027a35f6568fefcb12ef7023f86c75ad4d
-
SHA256
66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3
-
SHA512
8431b28193461e22c1d3df751f0fc8e696175b4cb52cde7dcb9a4e8ee8a513a106beec82e000f2239c32af57751983c14d21bacb4a64d0ff034eba788a8df3e2
-
SSDEEP
6144:evlJxAPFX/CZsTv7n8o5CwwGfLamPVWdciBNpf+2U65itWUvAkIKyli:4lwtisjbvZwSL9KciRfnFotWUYkIKyli
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe File opened for modification C:\Windows\assembly\Desktop.ini 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4524 set thread context of 3356 4524 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe 85 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe File created C:\Windows\assembly\Desktop.ini 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe File opened for modification C:\Windows\assembly\Desktop.ini 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3356 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4524 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe Token: SeDebugPrivilege 3356 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3356 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4524 wrote to memory of 3356 4524 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe 85 PID 4524 wrote to memory of 3356 4524 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe 85 PID 4524 wrote to memory of 3356 4524 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe 85 PID 4524 wrote to memory of 3356 4524 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe 85 PID 4524 wrote to memory of 3356 4524 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe 85 PID 4524 wrote to memory of 3356 4524 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe 85 PID 4524 wrote to memory of 3356 4524 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe 85 PID 4524 wrote to memory of 3356 4524 66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe"C:\Users\Admin\AppData\Local\Temp\66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe"C:\Users\Admin\AppData\Local\Temp\66ee1f20223335a676c5776e4ec3cef6cb070a43055099c3a3a69060886448a3.exe"2⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3356
-