Analysis
-
max time kernel
93s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 19:53
Static task
static1
Behavioral task
behavioral1
Sample
97f03419e9149575c159f6da79dc5309a41d453e2614a487092463a9899f1d79.exe
Resource
win7-20221111-en
4 signatures
150 seconds
General
-
Target
97f03419e9149575c159f6da79dc5309a41d453e2614a487092463a9899f1d79.exe
-
Size
187KB
-
MD5
0940e19f0c5c32cd1e935feb58c0d31b
-
SHA1
92fb58d870039ea262e9329e0ba658bfd2dfe197
-
SHA256
97f03419e9149575c159f6da79dc5309a41d453e2614a487092463a9899f1d79
-
SHA512
35371bf4b780a227829478e7ff9ede63b06d5790202bc290a9b955fa8406addd586fca89fc9c92dd8a7abc038d0d0efad2db8f8dcba0400d6baf2748ff73e7cf
-
SSDEEP
3072:RrFJ+7m32ed/2DhxoVKIIexZhtMVKVGxbfT/j/MYG:dT2DhxsR7LAo6DXY
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 97f03419e9149575c159f6da79dc5309a41d453e2614a487092463a9899f1d79.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 792 97f03419e9149575c159f6da79dc5309a41d453e2614a487092463a9899f1d79.exe 792 97f03419e9149575c159f6da79dc5309a41d453e2614a487092463a9899f1d79.exe 792 97f03419e9149575c159f6da79dc5309a41d453e2614a487092463a9899f1d79.exe 792 97f03419e9149575c159f6da79dc5309a41d453e2614a487092463a9899f1d79.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 792 97f03419e9149575c159f6da79dc5309a41d453e2614a487092463a9899f1d79.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 792 wrote to memory of 3060 792 97f03419e9149575c159f6da79dc5309a41d453e2614a487092463a9899f1d79.exe 40 PID 792 wrote to memory of 3060 792 97f03419e9149575c159f6da79dc5309a41d453e2614a487092463a9899f1d79.exe 40
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\97f03419e9149575c159f6da79dc5309a41d453e2614a487092463a9899f1d79.exe"C:\Users\Admin\AppData\Local\Temp\97f03419e9149575c159f6da79dc5309a41d453e2614a487092463a9899f1d79.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:792
-