Analysis
-
max time kernel
0s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/01/2023, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
PSGG.64.exe
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
PSGG.64.exe
Resource
win10v2004-20220812-en
6 signatures
150 seconds
General
-
Target
PSGG.64.exe
-
Size
5.8MB
-
MD5
fb118045236be0df996e7b5861392761
-
SHA1
0c701a2207dcbf017021a14f147056b9ec5f6f93
-
SHA256
0c0b7b872d2a2f28a30a9e5658f69582e4a380a7da634b92455c253ff7353cba
-
SHA512
3c1ce228ca07787cea2dec4305a6db79080ee875af4aa86f985c0ba266ec65b9db549deb6aa2077ca8e33b2f640aa1fbd49ffdfbeeb45ad75ba1fbf0fcdebbfd
-
SSDEEP
49152:zeihyJW85jPbi0Rbhdy2COliK6tESg1m2CsZCzvTU5GyJ6qaOT4JpTDajKx4U1s7:aXhxyVKJmTgaOBKwJco
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1940 PSGG.64.exe 1940 PSGG.64.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1940 PSGG.64.exe Token: SeLoadDriverPrivilege 1940 PSGG.64.exe Token: SeDebugPrivilege 1940 PSGG.64.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1940 PSGG.64.exe 1940 PSGG.64.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1940 PSGG.64.exe 1940 PSGG.64.exe