Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 04:56
Static task
static1
Behavioral task
behavioral1
Sample
58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe
Resource
win10v2004-20220812-en
General
-
Target
58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe
-
Size
305KB
-
MD5
92225dca9a4a89bd825025c044bcc923
-
SHA1
1f9eb9b0e391ecb30d7dffa482c895b694d0525b
-
SHA256
58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456
-
SHA512
d15af8ad901dbc47ba8cfde4ee018ad5c07185ebae94523937b944507fd184c1b8ff07de5e9094d133926e2888646658026afea0a3b36bbccd44c33a5f9a3df8
-
SSDEEP
6144:QOC2F8NXC796TB9vj48xgi61EVhFbLR0rcXmLYXCrt1jwG:QYeVQkTrvj4Qgl1EPFurYCrtVX
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Bifrost\server.exe 58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe File created C:\Windows\SysWOW64\Bifrost\server.exe 58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 704 set thread context of 792 704 58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe 27 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 704 58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe Token: SeDebugPrivilege 792 58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe Token: SeDebugPrivilege 792 58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 704 wrote to memory of 792 704 58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe 27 PID 704 wrote to memory of 792 704 58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe 27 PID 704 wrote to memory of 792 704 58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe 27 PID 704 wrote to memory of 792 704 58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe 27 PID 704 wrote to memory of 792 704 58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe 27 PID 704 wrote to memory of 792 704 58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe 27 PID 704 wrote to memory of 792 704 58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe"C:\Users\Admin\AppData\Local\Temp\58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exeC:\Users\Admin\AppData\Local\Temp\58eec050ad20d383ca30c61dd0df24f8904e1dec9947f13805859e8202d0a456.exe2⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:792
-