Analysis
-
max time kernel
138s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe
Resource
win10v2004-20221111-en
General
-
Target
e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe
-
Size
9.1MB
-
MD5
8493d1837f64c7b347f4b99bf1026eaf
-
SHA1
c4698abd488ced5ab61e3802eb188defbb56dddd
-
SHA256
e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37
-
SHA512
2234e5bb464ebfd43df2489469ab4f422b0795e5ed3169cce21b8af877190dd83f302aaf5d14b14bbf21b2b601d7bd814a2eab7708341f0a1b9c2aeaec5ca223
-
SSDEEP
98304:Okmbs9s9s9svxO5V3faIIICbEEEEEEEEEE2EEwEEEEEEEEEEEEEEEvEEEEEEEQb+:OpbIIIeO5wIII
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\dllhost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe" e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1152 e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1152 e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1152 e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1152 wrote to memory of 416 1152 e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe 3 PID 1152 wrote to memory of 416 1152 e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe 3 PID 1152 wrote to memory of 416 1152 e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe 3 PID 1152 wrote to memory of 416 1152 e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe 3
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Users\Admin\AppData\Local\Temp\e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe"C:\Users\Admin\AppData\Local\Temp\e55283082eb823b2ded798b03ddfefe951e9a7ec6d5920970c225fee642bdd37.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152