Resubmissions
07-02-2023 19:55
230207-yngtaafd73 1007-02-2023 18:36
230207-w9awradb82 1007-02-2023 18:33
230207-w67rbagd6w 1007-02-2023 18:22
230207-wz1pesgd3v 1006-02-2023 08:47
230206-kp6bdagc2s 1005-02-2023 06:30
230205-g9r3psbg2y 1005-02-2023 05:12
230205-fwa2labf3w 10Analysis
-
max time kernel
74s -
max time network
54s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-02-2023 19:55
Behavioral task
behavioral1
Sample
enc.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
enc.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
enc.exe
-
Size
7.0MB
-
MD5
2c3fd1791655c8e7c0f593bb73c405ab
-
SHA1
dc872a099c9639dd0f892493af332581b4cb3945
-
SHA256
cf999aff9bd0eff93c30faaf278035f58ccf70d690b54b2ddff8461b846008f2
-
SHA512
8fee2d35e0eb72d4ca0b1d7e72be2c7909cb92e33b7410b6ec7db6eeae0044d35ce6829610ed46a8207356f1e868dcbfd4d26b1b2ea9f0d458e168a5f1589f7d
-
SSDEEP
98304:bAQQU9TWEdwOY7jhM28X5dq8Lk1BssJJmk3os1hV:bAQQU4Mw37jhUX5KAsJJmcoeL
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1380 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: 33 1508 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1508 AUDIODG.EXE Token: 33 1508 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1508 AUDIODG.EXE Token: SeDebugPrivilege 1380 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1332 wrote to memory of 1380 1332 cmd.exe 34 PID 1332 wrote to memory of 1380 1332 cmd.exe 34 PID 1332 wrote to memory of 1380 1332 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\enc.exe"C:\Users\Admin\AppData\Local\Temp\enc.exe"1⤵PID:1996
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1568
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5101⤵
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380
-