Analysis
-
max time kernel
19s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 03:04
Static task
static1
Behavioral task
behavioral1
Sample
e9f12c57329fc224ad5da5bb06adcecca405b81c1ce2504d39867e7c78d42e62.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e9f12c57329fc224ad5da5bb06adcecca405b81c1ce2504d39867e7c78d42e62.exe
Resource
win10v2004-20220812-en
General
-
Target
e9f12c57329fc224ad5da5bb06adcecca405b81c1ce2504d39867e7c78d42e62.exe
-
Size
163KB
-
MD5
894c94298da133668550e1e46c117a83
-
SHA1
1f618e9f55140b73cf15b46601337990d3cd61b8
-
SHA256
e9f12c57329fc224ad5da5bb06adcecca405b81c1ce2504d39867e7c78d42e62
-
SHA512
1f03001927a3f6713ff3a2f4af8f91fdf5cfb039a1632ccf37f062797b6902b55d36b496025b500c2247fd6c8bd53573ecb5e1004f26b723f778873ed2a50cde
-
SSDEEP
3072:r8iTEN1vyO401ppJFojnjgJUpGpOydEXRZuiJDNkuNHnmz0+iausLQp:AiTEL6O40FsjjsUTydExJDN9NH9aVLQp
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\spool\PRTPROCS\x64\00000ca8.tmp e9f12c57329fc224ad5da5bb06adcecca405b81c1ce2504d39867e7c78d42e62.exe File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\00000ca8.tmp e9f12c57329fc224ad5da5bb06adcecca405b81c1ce2504d39867e7c78d42e62.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1756 e9f12c57329fc224ad5da5bb06adcecca405b81c1ce2504d39867e7c78d42e62.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1756 e9f12c57329fc224ad5da5bb06adcecca405b81c1ce2504d39867e7c78d42e62.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1756 e9f12c57329fc224ad5da5bb06adcecca405b81c1ce2504d39867e7c78d42e62.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9f12c57329fc224ad5da5bb06adcecca405b81c1ce2504d39867e7c78d42e62.exe"C:\Users\Admin\AppData\Local\Temp\e9f12c57329fc224ad5da5bb06adcecca405b81c1ce2504d39867e7c78d42e62.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1756