Analysis
-
max time kernel
49s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04-05-2023 02:01
Static task
static1
Behavioral task
behavioral1
Sample
1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe
Resource
win10v2004-20230220-en
General
-
Target
1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe
-
Size
852KB
-
MD5
d42cd95f4bc95f02825a48054c2bc1d2
-
SHA1
edf9a330fe6a0ab953097a573e171ea9a40fe40d
-
SHA256
1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51
-
SHA512
ead96568d9707a246ae310737daa2fd7edf4f4c991d339eb8e20ecba7d32705b4ea6893c26f53d9c1520d1391b63e5b0faedaf69385473314afd21297c156cfd
-
SSDEEP
12288:eH4XxAtOc6iyk7k27IB9mxzMefPXgq1fQu+78rjuLdvWhgzigSLwkVy5A5I4h:j6Uc6i9IKcpeXRdQD0j65egSLlyO5IK
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1220 wrote to memory of 572 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 28 PID 1220 wrote to memory of 572 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 28 PID 1220 wrote to memory of 572 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 28 PID 1220 wrote to memory of 572 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 28 PID 1220 wrote to memory of 760 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 29 PID 1220 wrote to memory of 760 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 29 PID 1220 wrote to memory of 760 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 29 PID 1220 wrote to memory of 760 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 29 PID 1220 wrote to memory of 940 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 30 PID 1220 wrote to memory of 940 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 30 PID 1220 wrote to memory of 940 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 30 PID 1220 wrote to memory of 940 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 30 PID 1220 wrote to memory of 588 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 31 PID 1220 wrote to memory of 588 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 31 PID 1220 wrote to memory of 588 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 31 PID 1220 wrote to memory of 588 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 31 PID 1220 wrote to memory of 676 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 32 PID 1220 wrote to memory of 676 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 32 PID 1220 wrote to memory of 676 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 32 PID 1220 wrote to memory of 676 1220 1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe"C:\Users\Admin\AppData\Local\Temp\1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe"C:\Users\Admin\AppData\Local\Temp\1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe"2⤵PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe"C:\Users\Admin\AppData\Local\Temp\1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe"2⤵PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe"C:\Users\Admin\AppData\Local\Temp\1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe"2⤵PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe"C:\Users\Admin\AppData\Local\Temp\1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe"2⤵PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe"C:\Users\Admin\AppData\Local\Temp\1fc2c7b3f3a14a3000e0987519317194f397340352ce23b12e7ae1bcfbb75c51.exe"2⤵PID:676
-