Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2023 19:42
Behavioral task
behavioral1
Sample
795d7e7e59e6744af103d9adfe16176676bd893a787fa3d849f58b3d37c11a0c.exe
Resource
win7-20230220-en
windows7-x64
7 signatures
150 seconds
General
-
Target
795d7e7e59e6744af103d9adfe16176676bd893a787fa3d849f58b3d37c11a0c.exe
-
Size
244KB
-
MD5
a37da3411327097088ceb65590b8c568
-
SHA1
066af8aba6b88cdcf254890ec076ba1951751e29
-
SHA256
795d7e7e59e6744af103d9adfe16176676bd893a787fa3d849f58b3d37c11a0c
-
SHA512
5908382f1abbc34a87f357937e3f74a6f105afb1f71a31f4716a638372cab2d28bf6b2af9b5eb0d99ed47d5e0f0fe1914b0b2db8c5d94de8630744fc2ba4402b
-
SSDEEP
3072:MFXMiTZOek0drM6a4VsBGcddZ2G3xebtvlxsmz:MFXMiTZxdrpK1vEZc
Malware Config
Signatures
-
Processes:
795d7e7e59e6744af103d9adfe16176676bd893a787fa3d849f58b3d37c11a0c.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 795d7e7e59e6744af103d9adfe16176676bd893a787fa3d849f58b3d37c11a0c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
795d7e7e59e6744af103d9adfe16176676bd893a787fa3d849f58b3d37c11a0c.exedescription pid process Token: SeDebugPrivilege 4472 795d7e7e59e6744af103d9adfe16176676bd893a787fa3d849f58b3d37c11a0c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
795d7e7e59e6744af103d9adfe16176676bd893a787fa3d849f58b3d37c11a0c.exepid process 4472 795d7e7e59e6744af103d9adfe16176676bd893a787fa3d849f58b3d37c11a0c.exe 4472 795d7e7e59e6744af103d9adfe16176676bd893a787fa3d849f58b3d37c11a0c.exe 4472 795d7e7e59e6744af103d9adfe16176676bd893a787fa3d849f58b3d37c11a0c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\795d7e7e59e6744af103d9adfe16176676bd893a787fa3d849f58b3d37c11a0c.exe"C:\Users\Admin\AppData\Local\Temp\795d7e7e59e6744af103d9adfe16176676bd893a787fa3d849f58b3d37c11a0c.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4472