Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 00:40
Behavioral task
behavioral1
Sample
534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe
Resource
win7-20220901-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe
-
Size
331KB
-
MD5
3421a54505b9f3712190b2f22dd5b01d
-
SHA1
f06d330452f76b312f8b0d9e86f6ff17acdb57d4
-
SHA256
534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7
-
SHA512
e4123b1fa38e3e8dad0236a61977da22c13f786812faec1825a40970b92bbba4b5bfb31051bc229609a49d67ea30cd8c56b34a984f2633eb58429d6a2ad6bda2
-
SSDEEP
6144:+tcDOslEMU1wZWnR5mQtTDlhjLxnhDedh2pEEjFbnzbbkgE7QIDU:kcDdzU+MnR8uD/jLedMpEuFbnzn1I4
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2024-55-0x0000000000400000-0x00000000004A0000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2024 set thread context of 940 2024 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 940 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 940 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 940 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2024 wrote to memory of 940 2024 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 27 PID 2024 wrote to memory of 940 2024 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 27 PID 2024 wrote to memory of 940 2024 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 27 PID 2024 wrote to memory of 940 2024 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 27 PID 2024 wrote to memory of 940 2024 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 27 PID 2024 wrote to memory of 940 2024 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 27 PID 2024 wrote to memory of 940 2024 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 27 PID 2024 wrote to memory of 940 2024 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 27 PID 2024 wrote to memory of 940 2024 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 27 PID 2024 wrote to memory of 940 2024 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 27 PID 940 wrote to memory of 1204 940 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 28 PID 940 wrote to memory of 1204 940 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 28 PID 940 wrote to memory of 1204 940 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 28 PID 940 wrote to memory of 1204 940 534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe"C:\Users\Admin\AppData\Local\Temp\534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exeC:\Users\Admin\AppData\Local\Temp\534ca86c29c3b2560137e0c4a5ad26df16497b7ae8f3de49523550e038bd3ba7.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:1204
-
-