Analysis
-
max time kernel
150s -
max time network
71s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-03-2023 04:36
Behavioral task
behavioral1
Sample
ea7a7b43678e881eb3fc2d64a54d3de8690a842f3fe1ca40cdab256e15824d1a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ea7a7b43678e881eb3fc2d64a54d3de8690a842f3fe1ca40cdab256e15824d1a.exe
Resource
win10v2004-20230221-en
General
-
Target
ea7a7b43678e881eb3fc2d64a54d3de8690a842f3fe1ca40cdab256e15824d1a.exe
-
Size
388KB
-
MD5
d6440255651366d1622fd0c32d298297
-
SHA1
27913ef1256dd10bac4ae4db696d037faa634797
-
SHA256
ea7a7b43678e881eb3fc2d64a54d3de8690a842f3fe1ca40cdab256e15824d1a
-
SHA512
4893537a2528781f25e764a6efa3f1bd9c223367e8389a4193bc23f4432cd61a8e9ee6e2f3c28ccc64911fa292db08d154544cbf996c65bf44766f066c9059a7
-
SSDEEP
12288:1Ov5jKhsfoPA+yeVKUCUxP4C902bdRtJJPisc2czyJ:1q5TfcdHj4fmbB5cz
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2044-61-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-62-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-63-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-64-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-65-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-66-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-67-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-68-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-69-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-70-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-71-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-72-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-73-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-74-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-75-0x0000000001340000-0x0000000001431000-memory.dmp upx behavioral1/memory/2044-76-0x0000000001340000-0x0000000001431000-memory.dmp upx -
AutoIT Executable 16 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2044-61-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-62-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-63-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-64-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-65-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-66-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-67-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-68-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-69-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-70-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-71-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-72-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-73-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-74-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-75-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe behavioral1/memory/2044-76-0x0000000001340000-0x0000000001431000-memory.dmp autoit_exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2044 ea7a7b43678e881eb3fc2d64a54d3de8690a842f3fe1ca40cdab256e15824d1a.exe