Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
14/08/2023, 20:09
Behavioral task
behavioral1
Sample
bOTj.exe
Resource
win7-20230712-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
bOTj.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
bOTj.exe
-
Size
32KB
-
MD5
d46f1f55a640e3ef3b694602a70e59ed
-
SHA1
cda09398a5611ab78cd16feea8c4dda9582b52af
-
SHA256
d6ad84287643e005e6a53037fbddd106b224524ad2b6157eee6445942cb6a954
-
SHA512
37f8fb38546355ea591a3e2ecb7596ced47068967cc88d950db72b928bf00f354256489e99aef190379f98f9e6bf37d84ff73063d954038a4fd88dba728c15a8
-
SSDEEP
384:g0bUe5XB4e0XmOnPw0Q0mS03AWTxtTUFQqzF0ObbZ:FT9Bu1I55dabZ
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: SeDebugPrivilege 2580 bOTj.exe Token: 33 2580 bOTj.exe Token: SeIncBasePriorityPrivilege 2580 bOTj.exe Token: 33 2580 bOTj.exe Token: SeIncBasePriorityPrivilege 2580 bOTj.exe Token: 33 2580 bOTj.exe Token: SeIncBasePriorityPrivilege 2580 bOTj.exe Token: 33 2580 bOTj.exe Token: SeIncBasePriorityPrivilege 2580 bOTj.exe Token: 33 2580 bOTj.exe Token: SeIncBasePriorityPrivilege 2580 bOTj.exe Token: 33 2580 bOTj.exe Token: SeIncBasePriorityPrivilege 2580 bOTj.exe Token: 33 2580 bOTj.exe Token: SeIncBasePriorityPrivilege 2580 bOTj.exe Token: 33 2580 bOTj.exe Token: SeIncBasePriorityPrivilege 2580 bOTj.exe Token: 33 2580 bOTj.exe Token: SeIncBasePriorityPrivilege 2580 bOTj.exe Token: 33 2580 bOTj.exe Token: SeIncBasePriorityPrivilege 2580 bOTj.exe Token: 33 2580 bOTj.exe Token: SeIncBasePriorityPrivilege 2580 bOTj.exe Token: 33 2580 bOTj.exe Token: SeIncBasePriorityPrivilege 2580 bOTj.exe Token: 33 2580 bOTj.exe Token: SeIncBasePriorityPrivilege 2580 bOTj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2580 wrote to memory of 3012 2580 bOTj.exe 31 PID 2580 wrote to memory of 3012 2580 bOTj.exe 31 PID 2580 wrote to memory of 3012 2580 bOTj.exe 31 PID 2580 wrote to memory of 3012 2580 bOTj.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\bOTj.exe"C:\Users\Admin\AppData\Local\Temp\bOTj.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd.exe /C Y /N /D Y /T 1 & Del "C:\Users\Admin\AppData\Local\Temp\bOTj.exe"2⤵PID:3012
-