Analysis

  • max time kernel
    16s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2023, 19:04

General

  • Target

    SelfishNetv0.2-beta_vista.exe

  • Size

    248KB

  • MD5

    04e079f6af9f84215596e22c6df03eec

  • SHA1

    db9c8822175050fcb728c88790ad77a1ad09dc3a

  • SHA256

    9e25c85c1593c019bc166dbc0829bd1e6df3f706ae160be3421464f0fa5a27ce

  • SHA512

    ac585fad570b4f04eaa074885f7c8b871eb57b6dd28bdc8d0881608d8fe59b2a3d89bff35363e4685057bd3c46079f6be4f46901362fcabbcabb0d485a221378

  • SSDEEP

    6144:feg7BdGQcmcXAMcccrGmNzLGpdg19bPyiYVQFpVSEqj3fRtwIdJ4bPTni2b4Huw7:7BdGQcmrXQdg192RMp8EUf

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SelfishNetv0.2-beta_vista.exe
    "C:\Users\Admin\AppData\Local\Temp\SelfishNetv0.2-beta_vista.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 436
      2⤵
        PID:1836
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1156
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x154
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:520

      Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1156-59-0x000007FEFB7B1000-0x000007FEFB7B3000-memory.dmp

              Filesize

              8KB

            • memory/1664-54-0x0000000075981000-0x0000000075983000-memory.dmp

              Filesize

              8KB

            • memory/1664-57-0x0000000074340000-0x00000000748EB000-memory.dmp

              Filesize

              5.7MB

            • memory/1664-58-0x0000000074340000-0x00000000748EB000-memory.dmp

              Filesize

              5.7MB