Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15/04/2023, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
5 signatures
150 seconds
General
-
Target
file.exe
-
Size
333KB
-
MD5
375e9f289820dab6d510d6c3174026fa
-
SHA1
4d3abd3910117bd0d373862b5db83c3853d54af4
-
SHA256
ef873cbbc63a247b0c37c0e1b08da86bbbd0526bfab6b5f5f1c699849a25bc9e
-
SHA512
9bf32f42125fe04c9d6065abb9ce45826ba85fb3fcf0f161457caebb907cb947becda7e716b7f871b431890fd4efc5fad411fe07a2b20caddd32300c051fdbf6
-
SSDEEP
6144:02oYeOklon+fbAAOv0KUYfp3x/DH5l9Nd:XeOkin+fbAn3xbHt
Score
6/10
Malware Config
Signatures
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1060 set thread context of 2000 1060 file.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2000 AppLaunch.exe 2000 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2000 AppLaunch.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2000 1060 file.exe 28 PID 1060 wrote to memory of 2000 1060 file.exe 28 PID 1060 wrote to memory of 2000 1060 file.exe 28 PID 1060 wrote to memory of 2000 1060 file.exe 28 PID 1060 wrote to memory of 2000 1060 file.exe 28 PID 1060 wrote to memory of 2000 1060 file.exe 28 PID 1060 wrote to memory of 2000 1060 file.exe 28 PID 1060 wrote to memory of 2000 1060 file.exe 28 PID 1060 wrote to memory of 2000 1060 file.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2000
-