Analysis
-
max time kernel
156s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
bfd797db1735a1c672b9d299da535e99bdea096a6d9a1cd87d262c72ebabbc6a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bfd797db1735a1c672b9d299da535e99bdea096a6d9a1cd87d262c72ebabbc6a.exe
Resource
win10v2004-20220812-en
General
-
Target
bfd797db1735a1c672b9d299da535e99bdea096a6d9a1cd87d262c72ebabbc6a.exe
-
Size
208KB
-
MD5
0520d04be3f21759503c05d595b73810
-
SHA1
af04aeeea3716da23427510250556e04bc05228e
-
SHA256
bfd797db1735a1c672b9d299da535e99bdea096a6d9a1cd87d262c72ebabbc6a
-
SHA512
03293e2744aa7cdb255f8dacbdc543110f2c79c6666df489de0c47d8265f99f9eda87ad35aa6e5ce3cfb9225015e44055d6b3f69087b12ec12087a231f23dec9
-
SSDEEP
3072:l6PAf+Q8wJno2lKiXNbBrBWIgYb1PipxjN1IN3qH92o1wPDFensXKh3nHD/sqIfT:Klw9ayTBW1bpxjwZFFqDo
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\iexplore.exe bfd797db1735a1c672b9d299da535e99bdea096a6d9a1cd87d262c72ebabbc6a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4060 bfd797db1735a1c672b9d299da535e99bdea096a6d9a1cd87d262c72ebabbc6a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfd797db1735a1c672b9d299da535e99bdea096a6d9a1cd87d262c72ebabbc6a.exe"C:\Users\Admin\AppData\Local\Temp\bfd797db1735a1c672b9d299da535e99bdea096a6d9a1cd87d262c72ebabbc6a.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4060