Analysis
-
max time kernel
31s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-03-2023 12:43
Static task
static1
Behavioral task
behavioral1
Sample
f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe
Resource
win10v2004-20230220-en
General
-
Target
f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe
-
Size
1.0MB
-
MD5
6ffcaa9d57ed36d74cac808ffc5fc9b6
-
SHA1
89c88ac7b1420300e2f63b5a7f863c7f672ba959
-
SHA256
f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa
-
SHA512
49f0afba5127f6caef4a78c3c1450c362543fa88b6eb9921d3621760912914b21aa19e55c3e780c13b21693e645bd151eeb83d58e03746f26434decf8d434676
-
SSDEEP
24576:y/OFMbQyXyXhZVTR0z71BM2TRkB6huiR3BSpNoVf0LTsIBMNjnNNOhAe/S0:dHyXyXQHFTRkB6hulb80
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exepid process 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exedescription pid process Token: SeBackupPrivilege 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe Token: SeSecurityPrivilege 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe Token: SeSecurityPrivilege 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe Token: SeBackupPrivilege 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe Token: SeSecurityPrivilege 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe Token: SeDebugPrivilege 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exedescription pid process target process PID 1208 wrote to memory of 472 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 472 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 472 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 472 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 580 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 580 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 580 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 580 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 376 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 376 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 376 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 376 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 1880 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 1880 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 1880 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 1880 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 1376 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 1376 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 1376 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe PID 1208 wrote to memory of 1376 1208 f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe"C:\Users\Admin\AppData\Local\Temp\f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\f7361813973bf5358dfe900784ab0c2cddd70ad3c1bfdeac1b1de494ffb2a3fa.exe"{path}"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1208-54-0x00000000003F0000-0x00000000004FA000-memory.dmpFilesize
1.0MB
-
memory/1208-55-0x0000000004C90000-0x0000000004CD0000-memory.dmpFilesize
256KB
-
memory/1208-56-0x0000000000230000-0x000000000023E000-memory.dmpFilesize
56KB
-
memory/1208-57-0x00000000050B0000-0x0000000005180000-memory.dmpFilesize
832KB
-
memory/1208-58-0x0000000004C90000-0x0000000004CD0000-memory.dmpFilesize
256KB
-
memory/1208-59-0x0000000006130000-0x00000000061EE000-memory.dmpFilesize
760KB
-
memory/1208-60-0x0000000004B10000-0x0000000004B8A000-memory.dmpFilesize
488KB