Analysis
-
max time kernel
38s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 04:28
Static task
static1
Behavioral task
behavioral1
Sample
973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe
Resource
win10v2004-20220812-en
General
-
Target
973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe
-
Size
697KB
-
MD5
9fe37018bb322e0a85257a0250bd4947
-
SHA1
29a9c47220ad617aef10cc294e7bc2b613300ee9
-
SHA256
973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e
-
SHA512
724068828b66fe8564166dd0022712b0b7cef6af356f90d2b87d6f4a252ab2d1ecb3fd0318f3906f524fb5fb34a25427e20af4256903f272c94ea5dfc5983ff0
-
SSDEEP
12288:yc//////2uMytuCT6a4efu+bZzeSo6laIgvvcLsAV2PSMstxwXzqpDLCsSupQWJx:yc//////2uPwF2fu+FSV6VKv7AV26MOp
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exedescription pid process target process PID 2000 set thread context of 1968 2000 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exedescription pid process Token: SeDebugPrivilege 1968 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exepid process 1968 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe 1968 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe 1968 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exedescription pid process target process PID 2000 wrote to memory of 1968 2000 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe PID 2000 wrote to memory of 1968 2000 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe PID 2000 wrote to memory of 1968 2000 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe PID 2000 wrote to memory of 1968 2000 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe PID 2000 wrote to memory of 1968 2000 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe PID 2000 wrote to memory of 1968 2000 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe 973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe"C:\Users\Admin\AppData\Local\Temp\973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exeC:\Users\Admin\AppData\Local\Temp\973e8f95327d0c08e15016e42834f3c171f2b9e04a86be1412e4d9e9b30c495e.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1968-54-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/1968-57-0x00000000004647DE-mapping.dmp
-
memory/1968-56-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/1968-59-0x00000000754E1000-0x00000000754E3000-memory.dmpFilesize
8KB
-
memory/1968-60-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/1968-61-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/1968-62-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB