Analysis
-
max time kernel
78s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09/01/2023, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e.exe
Resource
win10v2004-20221111-en
General
-
Target
d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e.exe
-
Size
3.2MB
-
MD5
1a6d25867ba0a964b17d5de42b089a08
-
SHA1
b49bd39ece3e9ef7406033b71e9264b96368fafb
-
SHA256
d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e
-
SHA512
c8c9e6bad2eefd541ea0f2ca107f3cf038bd26934740d7dab34503185aae685a5b8a850c57faaa82600e1f0cca47d583d7a52c85a00d45662ae490cdddd3e457
-
SSDEEP
98304:7YlToliya34y41MiJdhQbkjGYVnJvGNyQr8HzvN:0lTvKy4+8hFFVnRkNr8HzvN
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\UpAgent.log d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e.exe File opened for modification C:\Windows\SysWOW64\EdpRecUpAgent.log d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 856 d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 856 d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e.exe"C:\Users\Admin\AppData\Local\Temp\d2e5e5cd8dd235776167ac83d4e5b610e3af5544b23cfaaa534bc2266926740e.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:856