Analysis
-
max time kernel
274s -
max time network
367s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 14:14
Static task
static1
Behavioral task
behavioral1
Sample
bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe
Resource
win10v2004-20220812-en
General
-
Target
bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe
-
Size
38KB
-
MD5
5c0d1cc5a7033e98a7993f2c80b12d09
-
SHA1
defcc91dbcb74856873e725494c1f64b538fa4ac
-
SHA256
bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271
-
SHA512
f87adfc26883bc420e041527d18f0129433ad2aa1648e76b5e4b1deb60c28f70da9135d4ce1e40dfa312e51aab0a98ef0c5dceeaa64251b2490234b2b211a42d
-
SSDEEP
768:88L8LPJ868R878C888Q8E8m8E8d7/LNDyYgxJHlyf5RPEsw3EbHpsva5wRwUV5n:8bTJzqIfhbp1pG7/LpgxJFO5v8qqRwy9
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 516 set thread context of 1856 516 bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1856 bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1856 bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 516 wrote to memory of 1856 516 bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe 28 PID 516 wrote to memory of 1856 516 bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe 28 PID 516 wrote to memory of 1856 516 bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe 28 PID 516 wrote to memory of 1856 516 bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe 28 PID 516 wrote to memory of 1856 516 bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe 28 PID 516 wrote to memory of 1856 516 bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe 28 PID 516 wrote to memory of 1856 516 bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe 28 PID 516 wrote to memory of 1856 516 bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe 28 PID 1856 wrote to memory of 1264 1856 bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe"C:\Users\Admin\AppData\Local\Temp\bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:516 -
\??\c:\users\admin\appdata\local\temp\bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe"c:\users\admin\appdata\local\temp\bc8e5c04e3b6c2933c055e7a3fc1bc312fbade78dc210b782195af1c6df64271.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856
-
-