Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 12:12
Static task
static1
Behavioral task
behavioral1
Sample
garagula.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
garagula.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
garagula.exe
-
Size
306KB
-
MD5
699e657c4fa3284c3c87bdf19fa36cf5
-
SHA1
fa950f48df0ef532239443b6a290b35cab75fd3a
-
SHA256
5b3c365cffe1afef52d38aa90267929d0f4f485241d377ee47dadf9eba63ebe9
-
SHA512
1011c215de0921a53ec720d833e6073be4184134c66e8c30f59db9c6544f1e49cbcb0d6dcda2f88d589bc960fe937175dae0c1001f3bdaf23bf8cc4a32bc4882
-
SSDEEP
6144:WPLdBmvke5dEtvHVcT6MXUKUNBOA4gygC/jwjrC4a/NF1IPP:oB7pUEnHSgCMG/NF1q
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 948 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 948 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 948 1720 garagula.exe 28 PID 1720 wrote to memory of 948 1720 garagula.exe 28 PID 1720 wrote to memory of 948 1720 garagula.exe 28 PID 1720 wrote to memory of 948 1720 garagula.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\garagula.exe"C:\Users\Admin\AppData\Local\Temp\garagula.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:/Windows/SysWOW64/WindowsPowerShell/v1.0/powershell.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:948
-