Resubmissions
08-06-2023 20:18
230608-y3pgnsag5s 5Analysis
-
max time kernel
106s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08-06-2023 20:18
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
v2.4_2023/Setup.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
300 seconds
Behavioral task
behavioral2
Sample
v2.4_2023/Setup.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
3 signatures
300 seconds
General
-
Target
v2.4_2023/Setup.exe
-
Size
1.2MB
-
MD5
b48edb144a48bd29e3078b1a06258bf9
-
SHA1
d82508bbb08a2600ae61ee3c642992823cb5eae6
-
SHA256
c05c7ec4570bfc44e87f6e6efc83643b47a378bb088c53da4c5ecf7b93194dc6
-
SHA512
4fa787d3e3d6eb722bb623616751d18cec8f8a4427c33fc5d12d354d40d05f90b35afa9d735b2fbb551dc2f0ebb85d694d87bc2cac4ffb9d7b7fc997f73f6be0
-
SSDEEP
24576:QvCy4ovy82hVPV8+QkKY54+Lfy24N5j5Q+0Htnl:ryCLVq+QmySRv+0N
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1216 set thread context of 576 1216 Setup.exe 27 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1216 Setup.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1216 wrote to memory of 576 1216 Setup.exe 27 PID 1216 wrote to memory of 576 1216 Setup.exe 27 PID 1216 wrote to memory of 576 1216 Setup.exe 27 PID 1216 wrote to memory of 576 1216 Setup.exe 27 PID 1216 wrote to memory of 576 1216 Setup.exe 27 PID 1216 wrote to memory of 576 1216 Setup.exe 27 PID 1216 wrote to memory of 576 1216 Setup.exe 27 PID 1216 wrote to memory of 576 1216 Setup.exe 27 PID 1216 wrote to memory of 576 1216 Setup.exe 27 PID 1216 wrote to memory of 576 1216 Setup.exe 27 PID 1216 wrote to memory of 576 1216 Setup.exe 27 PID 1216 wrote to memory of 576 1216 Setup.exe 27 PID 1216 wrote to memory of 576 1216 Setup.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\v2.4_2023\Setup.exe"C:\Users\Admin\AppData\Local\Temp\v2.4_2023\Setup.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:576
-