Analysis
-
max time kernel
122s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
02/08/2023, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe
-
Size
710KB
-
MD5
ad4f2f6a656a68a65377a5192a3a3a3f
-
SHA1
e0d41cd0405b1c65fa33a6b4335c3c677a8e04df
-
SHA256
3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8
-
SHA512
14183d5693b22f6f6b8346e21e596ae25fd4c78ded9f480ac54326fd252e312d2ba57bbc2c89820ac5b6d64c78c01f3bb6c4835a2904fec41e2416516ac7994a
-
SSDEEP
12288:nsHrgjj1NswMg7U0FXCnO7uxCRWUsAL1DjQoA/C+vHUm:nsLgjj1Nqg7rZCn8uCRp1DjGC+v
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2288 set thread context of 2524 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 29 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 2524 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2524 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 29 PID 2288 wrote to memory of 2524 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 29 PID 2288 wrote to memory of 2524 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 29 PID 2288 wrote to memory of 2524 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 29 PID 2288 wrote to memory of 2524 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 29 PID 2288 wrote to memory of 2524 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 29 PID 2288 wrote to memory of 2524 2288 3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe"C:\Users\Admin\AppData\Local\Temp\3ff320e3607b1dfa12d8a8fdc4e4b8b34368cd47d848e39f30cc4d260fc612f8exe_JC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-