Analysis
-
max time kernel
49s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24-04-2023 01:23
Static task
static1
Behavioral task
behavioral1
Sample
a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe
Resource
win10v2004-20230220-en
General
-
Target
a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe
-
Size
851KB
-
MD5
3d695f1b4db5a0635d43e1cd1b9d48ae
-
SHA1
377936812ab222b69380049be6ad28208e135603
-
SHA256
a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0
-
SHA512
268e47ebb3d159ee3c33a0b0b5d8c4a272430544c01ff2c66c7918fabcba66e784edebd435e1200f0c0ce44c317b771f3b076d4548f9fbcd905079d47a434185
-
SSDEEP
12288:Y+vTN8RVtfK8cyo7qyy8SpCrqLKL2MhkHEmY4FrHSzn7rwR8mGyqF7qbnZ4Xb:Y6TNUVU8cmJ4rM3akk14JH+n78Z4Xb
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1228 wrote to memory of 432 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 27 PID 1228 wrote to memory of 432 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 27 PID 1228 wrote to memory of 432 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 27 PID 1228 wrote to memory of 432 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 27 PID 1228 wrote to memory of 592 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 28 PID 1228 wrote to memory of 592 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 28 PID 1228 wrote to memory of 592 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 28 PID 1228 wrote to memory of 592 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 28 PID 1228 wrote to memory of 1220 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 29 PID 1228 wrote to memory of 1220 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 29 PID 1228 wrote to memory of 1220 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 29 PID 1228 wrote to memory of 1220 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 29 PID 1228 wrote to memory of 1872 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 30 PID 1228 wrote to memory of 1872 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 30 PID 1228 wrote to memory of 1872 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 30 PID 1228 wrote to memory of 1872 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 30 PID 1228 wrote to memory of 1876 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 31 PID 1228 wrote to memory of 1876 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 31 PID 1228 wrote to memory of 1876 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 31 PID 1228 wrote to memory of 1876 1228 a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe"C:\Users\Admin\AppData\Local\Temp\a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe"C:\Users\Admin\AppData\Local\Temp\a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe"2⤵PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe"C:\Users\Admin\AppData\Local\Temp\a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe"2⤵PID:592
-
-
C:\Users\Admin\AppData\Local\Temp\a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe"C:\Users\Admin\AppData\Local\Temp\a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe"2⤵PID:1220
-
-
C:\Users\Admin\AppData\Local\Temp\a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe"C:\Users\Admin\AppData\Local\Temp\a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe"2⤵PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe"C:\Users\Admin\AppData\Local\Temp\a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0.exe"2⤵PID:1876
-