Analysis
-
max time kernel
172s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 17:48
Static task
static1
Behavioral task
behavioral1
Sample
67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe
Resource
win7-20221111-en
6 signatures
150 seconds
General
-
Target
67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe
-
Size
360KB
-
MD5
c3432a1a338c6e7b82e7c7c55ac730c3
-
SHA1
e5b2f9be0e45e9d1f51a633c1b8018ce556c909b
-
SHA256
67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461
-
SHA512
50e7b7104370ed1fc2e6848d2bceeb1533fb9fe3a68d9a06a2d13c97198c07e8cfded6b56e585a353ed72f7911beaf8372cd75e47f1e269750af619351c4bc48
-
SSDEEP
6144:UoGcdjit4YxAOD7NIMxa+EZR8EbrXc1+egmUxvmPMq:UoPdWtA+IMxa+kKajNTRv2
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1076 set thread context of 576 1076 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe 28 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 576 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1076 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe Token: SeDebugPrivilege 576 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 576 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1076 wrote to memory of 576 1076 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe 28 PID 1076 wrote to memory of 576 1076 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe 28 PID 1076 wrote to memory of 576 1076 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe 28 PID 1076 wrote to memory of 576 1076 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe 28 PID 1076 wrote to memory of 576 1076 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe 28 PID 1076 wrote to memory of 576 1076 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe 28 PID 1076 wrote to memory of 576 1076 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe 28 PID 1076 wrote to memory of 576 1076 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe 28 PID 1076 wrote to memory of 576 1076 67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe"C:\Users\Admin\AppData\Local\Temp\67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe"C:\Users\Admin\AppData\Local\Temp\67bbc1a389539d468271d9a12c235cda21af63ace5a4ddd1ebd97d4070c66461.exe"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:576
-