Analysis
-
max time kernel
202s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
ba5327139ce44f8968d6d09a8f37fffe1a9b87118ef45b63892b3d3a2864e087.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ba5327139ce44f8968d6d09a8f37fffe1a9b87118ef45b63892b3d3a2864e087.exe
Resource
win10v2004-20221111-en
General
-
Target
ba5327139ce44f8968d6d09a8f37fffe1a9b87118ef45b63892b3d3a2864e087.exe
-
Size
33KB
-
MD5
3c4ae874c0d8cc9b173d5a62c64b1e70
-
SHA1
7b2527a4b2c366069fc6c38b0d40a4c201632788
-
SHA256
ba5327139ce44f8968d6d09a8f37fffe1a9b87118ef45b63892b3d3a2864e087
-
SHA512
e377fc7bf51abaf65352307a05efab2cd8c3af1e7c43a2ffa856e6ae7202079120d707754bd7a057594271694108d3f3215409e54cf2f26508d05bd577884e51
-
SSDEEP
192:Avmd/4MOk7oyuxSsa0qU7i1qPYvKlaq95quZycVIbAx3w28WDY:Umdp0tSsatuDyD0Y
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4900 ba5327139ce44f8968d6d09a8f37fffe1a9b87118ef45b63892b3d3a2864e087.exe 4900 ba5327139ce44f8968d6d09a8f37fffe1a9b87118ef45b63892b3d3a2864e087.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4900 ba5327139ce44f8968d6d09a8f37fffe1a9b87118ef45b63892b3d3a2864e087.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 4900 wrote to memory of 2080 4900 ba5327139ce44f8968d6d09a8f37fffe1a9b87118ef45b63892b3d3a2864e087.exe 58
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\ba5327139ce44f8968d6d09a8f37fffe1a9b87118ef45b63892b3d3a2864e087.exe"C:\Users\Admin\AppData\Local\Temp\ba5327139ce44f8968d6d09a8f37fffe1a9b87118ef45b63892b3d3a2864e087.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900
-