Analysis
-
max time kernel
67s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30/06/2023, 12:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
mapper.exe
Resource
win7-20230621-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
mapper.exe
Resource
win10v2004-20230621-en
5 signatures
150 seconds
General
-
Target
mapper.exe
-
Size
5.3MB
-
MD5
97d2822b1e3221cface2dcea55096d8c
-
SHA1
a856fb34bac6c30715f32162ae7a28311ffd098e
-
SHA256
81471f1305575f28f1de8bffdaf11350da987542cac12f12c561cda0bf4fd089
-
SHA512
fb89ae1e83ea5a656ed5e8e312eab81825d52a80bcb8fc07b8f314adf8192928d7fbd19ce596c31336b75b7e77d2f9a176d42fcd91620c042031dd1678b587db
-
SSDEEP
98304:QTuFltXQ05AkisVaCoK7YvLEEnXbixp4QYDsT/81x22mMbN:QeykiswCoDL6eH0/814p
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TSQkZoyBcOUBnRnuaAsNUMou\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\TSQkZoyBcOUBnRnuaAsNUMou" mapper.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1416 mapper.exe 1416 mapper.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1416 mapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1416 mapper.exe