Analysis
-
max time kernel
130s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 00:15
Static task
static1
Behavioral task
behavioral1
Sample
2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821.exe
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821.exe
-
Size
271KB
-
MD5
82bcb8a13e8ceb50eebff87f82063cf9
-
SHA1
7dd53680f2e130b7742c6da40d69b73c4c0d2330
-
SHA256
2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821
-
SHA512
f5b6f9b17f33fc756964c7e3475f035b48e9c98efc464f7cb3bba56c163c0fd906194dc1438eada8a6782fdf55a5842af3850b2e7dd61f8fe2cab4acab3a083f
-
SSDEEP
6144:sKiYzCL3uzCfBFKbuzXEtUhQ6s5Y+Xfs/zVMLtJhToRtctlslh:tPzCDk0BFKaDE6a6sij/khsRtIkh
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821.exe File opened for modification C:\Windows\assembly\Desktop.ini 2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini 2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821.exe File opened for modification C:\Windows\assembly 2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821.exe File created C:\Windows\assembly\Desktop.ini 2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3404 2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3404 2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821.exe Token: SeDebugPrivilege 3404 2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3404 2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821.exe"C:\Users\Admin\AppData\Local\Temp\2d690edd8506c8adaeef710addce7282f3e79840873841d8765ed098a673b821.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3404