Analysis
-
max time kernel
144s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2022 10:59
Static task
static1
Behavioral task
behavioral1
Sample
be5fb7cca65a00561580e2a78fec9988647e4480eaca2992a2981d21e8472215.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
be5fb7cca65a00561580e2a78fec9988647e4480eaca2992a2981d21e8472215.exe
Resource
win10v2004-20221111-en
General
-
Target
be5fb7cca65a00561580e2a78fec9988647e4480eaca2992a2981d21e8472215.exe
-
Size
448KB
-
MD5
0ad70b4963af126e3e63f19acc09c6de
-
SHA1
308edba2f673a5f79c21d620df5d719374c0db44
-
SHA256
be5fb7cca65a00561580e2a78fec9988647e4480eaca2992a2981d21e8472215
-
SHA512
e409248885243c0f62190ae5aee1eb5972905af1deb8f302871f7fc6a6f97024ad56559a0b2a98be7a5819968a726d225f84b20b9882ee56a8ee9b9ac7198f50
-
SSDEEP
12288:iBIi3wK65p+wx3aJaVIqwG8s7nukXPKSvqiELMHsB5:UIhZaJaVI1GFukX9vqs8
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 964 be5fb7cca65a00561580e2a78fec9988647e4480eaca2992a2981d21e8472215.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 964 be5fb7cca65a00561580e2a78fec9988647e4480eaca2992a2981d21e8472215.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 964 wrote to memory of 212 964 be5fb7cca65a00561580e2a78fec9988647e4480eaca2992a2981d21e8472215.exe 84 PID 964 wrote to memory of 212 964 be5fb7cca65a00561580e2a78fec9988647e4480eaca2992a2981d21e8472215.exe 84 PID 964 wrote to memory of 212 964 be5fb7cca65a00561580e2a78fec9988647e4480eaca2992a2981d21e8472215.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\be5fb7cca65a00561580e2a78fec9988647e4480eaca2992a2981d21e8472215.exe"C:\Users\Admin\AppData\Local\Temp\be5fb7cca65a00561580e2a78fec9988647e4480eaca2992a2981d21e8472215.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\BE5FB7~1.EXE2⤵PID:212
-