Analysis
-
max time kernel
290s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 22:40
Static task
static1
Behavioral task
behavioral1
Sample
617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe
Resource
win10-20220812-en
General
-
Target
617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe
-
Size
910KB
-
MD5
d00632c5fb5a80b955e3903721a62356
-
SHA1
b085642b1cc779ee89211d84be0c0c1d5d919ca7
-
SHA256
617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207
-
SHA512
9b2a1b29e050ca596d7fdcf21e4be24e7f8e23b933a20995905bd85ec482e47478c948d820dc9d32db63b0131346916d4cc8b2d32e9081cba038cf33583f294f
-
SSDEEP
12288:B80wOZQAsR9xGi3D0231Hz4M8dhdL3nr1qxLgmegUZbYkg586aWHff:S7Fb91adr1qJ0gUZYB5O8f
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1704 wrote to memory of 772 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 28 PID 1704 wrote to memory of 772 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 28 PID 1704 wrote to memory of 772 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 28 PID 1704 wrote to memory of 772 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 28 PID 1704 wrote to memory of 608 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 29 PID 1704 wrote to memory of 608 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 29 PID 1704 wrote to memory of 608 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 29 PID 1704 wrote to memory of 608 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 29 PID 1704 wrote to memory of 676 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 30 PID 1704 wrote to memory of 676 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 30 PID 1704 wrote to memory of 676 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 30 PID 1704 wrote to memory of 676 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 30 PID 1704 wrote to memory of 1412 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 31 PID 1704 wrote to memory of 1412 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 31 PID 1704 wrote to memory of 1412 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 31 PID 1704 wrote to memory of 1412 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 31 PID 1704 wrote to memory of 1416 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 32 PID 1704 wrote to memory of 1416 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 32 PID 1704 wrote to memory of 1416 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 32 PID 1704 wrote to memory of 1416 1704 617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe"C:\Users\Admin\AppData\Local\Temp\617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe"C:\Users\Admin\AppData\Local\Temp\617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe"2⤵PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe"C:\Users\Admin\AppData\Local\Temp\617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe"2⤵PID:608
-
-
C:\Users\Admin\AppData\Local\Temp\617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe"C:\Users\Admin\AppData\Local\Temp\617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe"2⤵PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe"C:\Users\Admin\AppData\Local\Temp\617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe"2⤵PID:1412
-
-
C:\Users\Admin\AppData\Local\Temp\617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe"C:\Users\Admin\AppData\Local\Temp\617eb8fd49eb9249fac0985a70d28a639e2da4306b43ece3d253132753e6b207.exe"2⤵PID:1416
-