Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 10:16
Static task
static1
Behavioral task
behavioral1
Sample
26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe
Resource
win10v2004-20220812-en
General
-
Target
26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe
-
Size
1.9MB
-
MD5
bfa089edb97ae879925dbfa23d4374be
-
SHA1
f080370a3f8c07c2cfc48661caf734f6e053a83f
-
SHA256
26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df
-
SHA512
3e3b60c3914e8b53cc2c1364eecc53f881449ae4df9429c7435438c277872dcb787313623900a1b7ac28b3aadff41a804a6316f4b5ce75bc175d591d577b461d
-
SSDEEP
49152:3v+Xdh4YFvU1YOf7j/dHxQpa4rL5XOrcuY3J+pdtp93yokVX:6dh4YdCf7h2p7NmjwJ+pY
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exepid process 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exedescription pid process Token: SeDebugPrivilege 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exedescription pid process target process PID 1552 wrote to memory of 1472 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 1472 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 1472 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 1472 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 1480 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 1480 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 1480 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 1480 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 1076 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 1076 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 1076 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 1076 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 592 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 592 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 592 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 592 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 676 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 676 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 676 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe PID 1552 wrote to memory of 676 1552 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe 26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe"C:\Users\Admin\AppData\Local\Temp\26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\26fdffa14128573dcdd5d3b64724677e98d7646b623d1e6a7af1a193cca483df.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1552-54-0x0000000000310000-0x00000000004F4000-memory.dmpFilesize
1.9MB
-
memory/1552-55-0x0000000075681000-0x0000000075683000-memory.dmpFilesize
8KB
-
memory/1552-56-0x0000000000530000-0x0000000000542000-memory.dmpFilesize
72KB
-
memory/1552-57-0x0000000007F30000-0x00000000080D4000-memory.dmpFilesize
1.6MB
-
memory/1552-58-0x0000000005FE0000-0x0000000006132000-memory.dmpFilesize
1.3MB