Analysis
-
max time kernel
155s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 00:28
Static task
static1
Behavioral task
behavioral1
Sample
66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe
Resource
win7-20221111-en
windows7-x64
6 signatures
150 seconds
General
-
Target
66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe
-
Size
360KB
-
MD5
44efc9de6edc60517a544eb815a96688
-
SHA1
f5f4fda330c0551a0590fd265d9fe5ccaf6a2a8c
-
SHA256
66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3
-
SHA512
3b6ca401816e1a27d80cd49b1f7dd48da959c422ac5d9af1c1b62976441fdbdc7b7edd153cc1b39c6b03c1bbce147c6ad38b4bec694ac0070bda75cf800443c1
-
SSDEEP
6144:TTj9GGl4KGYoD+AcO0fG7krC8NK9mkP3rhtWLXPMq:TPhlvroKM0J49fP96
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1396 set thread context of 1732 1396 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe 28 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1732 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1396 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe Token: SeDebugPrivilege 1732 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1732 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1396 wrote to memory of 1732 1396 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe 28 PID 1396 wrote to memory of 1732 1396 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe 28 PID 1396 wrote to memory of 1732 1396 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe 28 PID 1396 wrote to memory of 1732 1396 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe 28 PID 1396 wrote to memory of 1732 1396 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe 28 PID 1396 wrote to memory of 1732 1396 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe 28 PID 1396 wrote to memory of 1732 1396 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe 28 PID 1396 wrote to memory of 1732 1396 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe 28 PID 1396 wrote to memory of 1732 1396 66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe"C:\Users\Admin\AppData\Local\Temp\66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe"C:\Users\Admin\AppData\Local\Temp\66d0edeb120cfd683168489e9ea73c46d68ba7802d89155bb2b6ea9317a564d3.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1732
-