Analysis
-
max time kernel
10s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec.exe
Resource
win10v2004-20220812-en
General
-
Target
f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec.exe
-
Size
846KB
-
MD5
b99aa5aea8549bde34e2df22e005820c
-
SHA1
467a93972067290ab134aaede10b80718828a22a
-
SHA256
f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec
-
SHA512
9f1a58ebfdff32f20008a5dd57f2e01c454f66f0cb961e5f88dd0154393a13e604c80cb48e8d56374477fdcc54e552dc8f4675de31a69533e97309f0890b37e4
-
SSDEEP
12288:Npb84UdknIOGAAmv18RQuOH21OkU3wM3VMCpzZ3M6PY9BKxPM9+SWSOyE9WDkrP2:NpxUdkn3FeM3NpzZYcs+zS3JkrXUj
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 904 f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec.exe Token: SeDebugPrivilege 904 f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 904 f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec.exe 904 f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 904 wrote to memory of 944 904 f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec.exe 28 PID 904 wrote to memory of 944 904 f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec.exe 28 PID 904 wrote to memory of 944 904 f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec.exe 28 PID 904 wrote to memory of 944 904 f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec.exe"C:\Users\Admin\AppData\Local\Temp\f0c5718a66969caa1ebd686f074a00bcd8bb844dfdf7d658c9b893a0a60700ec.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\WINDOWS\explorer.exeC:\WINDOWS\explorer.exe2⤵PID:944
-