Analysis
-
max time kernel
42s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-03-2023 14:40
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
1.3MB
-
MD5
d8e622d9974ee940831e507fac715c94
-
SHA1
7f6b6850c5146c6942148eae317387e5c85342ea
-
SHA256
7988fe75eb1abeac99917732c69e0de5e96137b5a8f471b4c8af2ef378505312
-
SHA512
6c5bd4dd4bfbb4c75bf392141446496473cf035ebfe6b70bdfe0278ec67ffbffdc4b9ba937ca80d5ef7ed80fa8ce6ca3ebd4e02821f155580377b503ed17a3d6
-
SSDEEP
24576:V5F02vDR3+R4znIM4PkgW6REfPSt6BPoUi17+9QloSN3TEt8dni:fF/9RnIIgWBg+AUi1S9QCSNDEin
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
tmp.exepid process 1064 tmp.exe 1064 tmp.exe 1064 tmp.exe 1064 tmp.exe 1064 tmp.exe 1064 tmp.exe 1064 tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tmp.exedescription pid process Token: SeDebugPrivilege 1064 tmp.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
tmp.exedescription pid process target process PID 1064 wrote to memory of 740 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 740 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 740 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 740 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 268 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 268 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 268 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 268 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 1860 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 1860 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 1860 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 1860 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 1856 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 1856 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 1856 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 1856 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 520 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 520 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 520 1064 tmp.exe tmp.exe PID 1064 wrote to memory of 520 1064 tmp.exe tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:740
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:268
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:520
-