Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 00:13
Static task
static1
Behavioral task
behavioral1
Sample
caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe
Resource
win10v2004-20220812-en
General
-
Target
caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe
-
Size
188KB
-
MD5
36b812c29506a9a9c12f02b8bb3e2035
-
SHA1
8d0b6a1805e8dd9a03bcacdf051126e950b2b2ea
-
SHA256
caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4
-
SHA512
2234d67c3420b04d25bc65a7917fa4de0e71709abe5e963d22781469c49b5449901047b6e4fd0107d3ecb8395e19c45602f06bf493e4aa33c405a3cc8dc18f19
-
SSDEEP
3072:uOddOZKczNR02NaiDCxcikVJ8DSmMDf1VZ11QaW0yuCU:Dd4z6ieWVuDzMLlTxW0yg
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1688 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1688 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27 PID 1492 wrote to memory of 1688 1492 caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe"C:\Users\Admin\AppData\Local\Temp\caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.EXE"C:\Users\Admin\AppData\Local\Temp\caff9093a9b21a339e1b180ed29488611de1021e7fd66fe25799fe2de440aef4.EXE"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688
-