Analysis
-
max time kernel
48s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 18:17
Static task
static1
Behavioral task
behavioral1
Sample
393b734b0ad5ebc5041aa33018a86422c5aafc7b681c242467697242994bea68.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
393b734b0ad5ebc5041aa33018a86422c5aafc7b681c242467697242994bea68.exe
Resource
win10v2004-20220812-en
General
-
Target
393b734b0ad5ebc5041aa33018a86422c5aafc7b681c242467697242994bea68.exe
-
Size
296KB
-
MD5
fbb4b4d737142da694d94acb2e127ed8
-
SHA1
e4b665b493972561a39f422aed1189f35fdea800
-
SHA256
393b734b0ad5ebc5041aa33018a86422c5aafc7b681c242467697242994bea68
-
SHA512
adbe38ba5896f87c095e60e2121baabd3051d06df31e2cd875f40f32ba9acabd33eecf2c613da897d34afbd811f780efa61caa4abdd5bf6b4d2cb982dc1e01ed
-
SSDEEP
6144:ZssVkGPVXhBt+ghWd7BTw5qIY7mMmFLra7RDO1f2BG:qsxXhBt+sC9TKqIY7mFLra7Rgf2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1628 svhost.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svhost.exe 393b734b0ad5ebc5041aa33018a86422c5aafc7b681c242467697242994bea68.exe File opened for modification C:\Windows\SysWOW64\ieapfltr.dat svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\ieapfltr.dat 393b734b0ad5ebc5041aa33018a86422c5aafc7b681c242467697242994bea68.exe File created C:\Windows\SysWOW64\svhost.exe 393b734b0ad5ebc5041aa33018a86422c5aafc7b681c242467697242994bea68.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1776 393b734b0ad5ebc5041aa33018a86422c5aafc7b681c242467697242994bea68.exe Token: SeDebugPrivilege 1628 svhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\393b734b0ad5ebc5041aa33018a86422c5aafc7b681c242467697242994bea68.exe"C:\Users\Admin\AppData\Local\Temp\393b734b0ad5ebc5041aa33018a86422c5aafc7b681c242467697242994bea68.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
C:\Windows\SysWOW64\svhost.exeC:\Windows\SysWOW64\svhost.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1628
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5fbb4b4d737142da694d94acb2e127ed8
SHA1e4b665b493972561a39f422aed1189f35fdea800
SHA256393b734b0ad5ebc5041aa33018a86422c5aafc7b681c242467697242994bea68
SHA512adbe38ba5896f87c095e60e2121baabd3051d06df31e2cd875f40f32ba9acabd33eecf2c613da897d34afbd811f780efa61caa4abdd5bf6b4d2cb982dc1e01ed
-
Filesize
296KB
MD5fbb4b4d737142da694d94acb2e127ed8
SHA1e4b665b493972561a39f422aed1189f35fdea800
SHA256393b734b0ad5ebc5041aa33018a86422c5aafc7b681c242467697242994bea68
SHA512adbe38ba5896f87c095e60e2121baabd3051d06df31e2cd875f40f32ba9acabd33eecf2c613da897d34afbd811f780efa61caa4abdd5bf6b4d2cb982dc1e01ed