Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2023 20:37
Static task
static1
Behavioral task
behavioral1
Sample
Install.exe
Resource
win7-20220812-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
Install.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Install.exe
-
Size
735.3MB
-
MD5
f2b49ceea3013512f24008455c8ebbfb
-
SHA1
4ca2531a0c43309b4029ba74540317548da9d461
-
SHA256
1ce7365e962ceda771c49c5f3ac373c8befc07f29d632816c6bfbea22e5dbfe4
-
SHA512
32ae2176d12da1c8bd446fc785e3c2ad7cefd42a587c875ebbc27451136b08dd6b9ca1dc6e376fb96361caa2d3d37b25e634e375788121922d53e330e8699df3
-
SSDEEP
98304:WVP/KBE21lMdByvPKSpB4t2VXSD1TwF7t9VM8hoA:aHKBtrKSpBmIXSD18p9Y
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Install.exepid process 1460 Install.exe 1460 Install.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Install.exedescription pid process Token: SeDebugPrivilege 1460 Install.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Install.exedescription pid process target process PID 1460 wrote to memory of 1468 1460 Install.exe jsc.exe PID 1460 wrote to memory of 1468 1460 Install.exe jsc.exe PID 1460 wrote to memory of 1468 1460 Install.exe jsc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Install.exe"C:\Users\Admin\AppData\Local\Temp\Install.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"2⤵