Analysis
-
max time kernel
46s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-05-2023 01:49
Static task
static1
Behavioral task
behavioral1
Sample
9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe
Resource
win10v2004-20230220-en
General
-
Target
9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe
-
Size
1.5MB
-
MD5
67683d83541b578498d12ddc5828260e
-
SHA1
679904b6c6101f399811885b42e98c4c8c564e6e
-
SHA256
9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680
-
SHA512
fb3080919598e0bedaa3b429e86f498bbbfcfb257a9c92dc9f6c197e2da9bd17328cc762bd97e7cbb770f0d6f1e8c8c05107a59f6204ce8ebc5ad4996e8e709b
-
SSDEEP
24576:sLOOmjfJ7uGyhgAzbOQ31ubRVTkK09CDg2bCaUwFDyfCTdNuuVIF/gwqb+:sG17uGmPOQ3oNVTkhC/bCaUwpy2wuV32
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1376 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 28 PID 2016 wrote to memory of 1376 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 28 PID 2016 wrote to memory of 1376 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 28 PID 2016 wrote to memory of 1376 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 28 PID 2016 wrote to memory of 968 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 29 PID 2016 wrote to memory of 968 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 29 PID 2016 wrote to memory of 968 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 29 PID 2016 wrote to memory of 968 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 29 PID 2016 wrote to memory of 692 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 30 PID 2016 wrote to memory of 692 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 30 PID 2016 wrote to memory of 692 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 30 PID 2016 wrote to memory of 692 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 30 PID 2016 wrote to memory of 1900 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 31 PID 2016 wrote to memory of 1900 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 31 PID 2016 wrote to memory of 1900 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 31 PID 2016 wrote to memory of 1900 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 31 PID 2016 wrote to memory of 1300 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 32 PID 2016 wrote to memory of 1300 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 32 PID 2016 wrote to memory of 1300 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 32 PID 2016 wrote to memory of 1300 2016 9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe"C:\Users\Admin\AppData\Local\Temp\9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe"C:\Users\Admin\AppData\Local\Temp\9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe"2⤵PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe"C:\Users\Admin\AppData\Local\Temp\9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe"2⤵PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe"C:\Users\Admin\AppData\Local\Temp\9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe"2⤵PID:692
-
-
C:\Users\Admin\AppData\Local\Temp\9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe"C:\Users\Admin\AppData\Local\Temp\9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe"2⤵PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe"C:\Users\Admin\AppData\Local\Temp\9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680.exe"2⤵PID:1300
-