Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21/07/2023, 16:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
INQUIRY.exe
Resource
win7-20230712-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
INQUIRY.exe
Resource
win10v2004-20230703-en
4 signatures
150 seconds
General
-
Target
INQUIRY.exe
-
Size
884KB
-
MD5
0972962189b71513753b8d18b5534d3d
-
SHA1
25af31400e9826c8e8ae8819fee378edb514c7df
-
SHA256
5d95b52efcb12349fe0a0734622162be408c34b0b970239e3dd374bb47b133ac
-
SHA512
d83e22d0c58a5bc48ce5edcc24f6a536ad059e9041233e1b1c98ab06363f53160dfe5d43c7b16c19d821c99d3269877f342f6b08ce81307b550b36a3ea373ba4
-
SSDEEP
24576:lU2+wd/r90JNuanPwZU1FC426I5+p4+5VfBVfBVf:O2+KmWOIZo4x6I5W4+TfLfLf
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2108 set thread context of 2980 2108 INQUIRY.exe 30 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2108 INQUIRY.exe 2108 INQUIRY.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe 2980 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2108 INQUIRY.exe Token: SeDebugPrivilege 2980 RegSvcs.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2980 2108 INQUIRY.exe 30 PID 2108 wrote to memory of 2980 2108 INQUIRY.exe 30 PID 2108 wrote to memory of 2980 2108 INQUIRY.exe 30 PID 2108 wrote to memory of 2980 2108 INQUIRY.exe 30 PID 2108 wrote to memory of 2980 2108 INQUIRY.exe 30 PID 2108 wrote to memory of 2980 2108 INQUIRY.exe 30 PID 2108 wrote to memory of 2980 2108 INQUIRY.exe 30 PID 2108 wrote to memory of 2980 2108 INQUIRY.exe 30 PID 2108 wrote to memory of 2980 2108 INQUIRY.exe 30 PID 2108 wrote to memory of 2980 2108 INQUIRY.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2980
-