Analysis
-
max time kernel
48s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-03-2023 00:51
Static task
static1
Behavioral task
behavioral1
Sample
7048e3a317565c358dcbf27b24abaa39.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
7048e3a317565c358dcbf27b24abaa39.exe
-
Size
1.1MB
-
MD5
7048e3a317565c358dcbf27b24abaa39
-
SHA1
d847e157c186765ba54d856a3feee9af9fb5ca6b
-
SHA256
dc104af3263fc87bbfb9002f805de324e608ed2a8ba8d127365e09d3d3bdbf99
-
SHA512
da7a4271a6c89b644e418d212cbb3b955018f64720b64d34d8ca21e0a8eee1dcce6f7aac31200d9c1b13a512551271f74e8933aaecc79cc839e75ad75c12de16
-
SSDEEP
24576:PfYsg64i1TqRNfRpoxg/+ANtg6xXLCqmANmlHj:PfP/tqrRsg/+qtgPAQF
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2036 7048e3a317565c358dcbf27b24abaa39.exe 2036 7048e3a317565c358dcbf27b24abaa39.exe 2036 7048e3a317565c358dcbf27b24abaa39.exe 2036 7048e3a317565c358dcbf27b24abaa39.exe 2036 7048e3a317565c358dcbf27b24abaa39.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2036 7048e3a317565c358dcbf27b24abaa39.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1036 2036 7048e3a317565c358dcbf27b24abaa39.exe 28 PID 2036 wrote to memory of 1036 2036 7048e3a317565c358dcbf27b24abaa39.exe 28 PID 2036 wrote to memory of 1036 2036 7048e3a317565c358dcbf27b24abaa39.exe 28 PID 2036 wrote to memory of 1036 2036 7048e3a317565c358dcbf27b24abaa39.exe 28 PID 2036 wrote to memory of 436 2036 7048e3a317565c358dcbf27b24abaa39.exe 29 PID 2036 wrote to memory of 436 2036 7048e3a317565c358dcbf27b24abaa39.exe 29 PID 2036 wrote to memory of 436 2036 7048e3a317565c358dcbf27b24abaa39.exe 29 PID 2036 wrote to memory of 436 2036 7048e3a317565c358dcbf27b24abaa39.exe 29 PID 2036 wrote to memory of 596 2036 7048e3a317565c358dcbf27b24abaa39.exe 30 PID 2036 wrote to memory of 596 2036 7048e3a317565c358dcbf27b24abaa39.exe 30 PID 2036 wrote to memory of 596 2036 7048e3a317565c358dcbf27b24abaa39.exe 30 PID 2036 wrote to memory of 596 2036 7048e3a317565c358dcbf27b24abaa39.exe 30 PID 2036 wrote to memory of 692 2036 7048e3a317565c358dcbf27b24abaa39.exe 31 PID 2036 wrote to memory of 692 2036 7048e3a317565c358dcbf27b24abaa39.exe 31 PID 2036 wrote to memory of 692 2036 7048e3a317565c358dcbf27b24abaa39.exe 31 PID 2036 wrote to memory of 692 2036 7048e3a317565c358dcbf27b24abaa39.exe 31 PID 2036 wrote to memory of 584 2036 7048e3a317565c358dcbf27b24abaa39.exe 32 PID 2036 wrote to memory of 584 2036 7048e3a317565c358dcbf27b24abaa39.exe 32 PID 2036 wrote to memory of 584 2036 7048e3a317565c358dcbf27b24abaa39.exe 32 PID 2036 wrote to memory of 584 2036 7048e3a317565c358dcbf27b24abaa39.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7048e3a317565c358dcbf27b24abaa39.exe"C:\Users\Admin\AppData\Local\Temp\7048e3a317565c358dcbf27b24abaa39.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\7048e3a317565c358dcbf27b24abaa39.exe"C:\Users\Admin\AppData\Local\Temp\7048e3a317565c358dcbf27b24abaa39.exe"2⤵PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\7048e3a317565c358dcbf27b24abaa39.exe"C:\Users\Admin\AppData\Local\Temp\7048e3a317565c358dcbf27b24abaa39.exe"2⤵PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\7048e3a317565c358dcbf27b24abaa39.exe"C:\Users\Admin\AppData\Local\Temp\7048e3a317565c358dcbf27b24abaa39.exe"2⤵PID:596
-
-
C:\Users\Admin\AppData\Local\Temp\7048e3a317565c358dcbf27b24abaa39.exe"C:\Users\Admin\AppData\Local\Temp\7048e3a317565c358dcbf27b24abaa39.exe"2⤵PID:692
-
-
C:\Users\Admin\AppData\Local\Temp\7048e3a317565c358dcbf27b24abaa39.exe"C:\Users\Admin\AppData\Local\Temp\7048e3a317565c358dcbf27b24abaa39.exe"2⤵PID:584
-