Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20/08/2023, 04:49
Static task
static1
Behavioral task
behavioral1
Sample
ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe
Resource
win7-20230712-en
6 signatures
300 seconds
General
-
Target
ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe
-
Size
1.8MB
-
MD5
5d67143890a04e6099dfde09edcf7e26
-
SHA1
79e68133b90d2d9d4829b1f0bc05a64ebb3660e9
-
SHA256
ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf
-
SHA512
b0dfffd88b58325be982feed520b17330a69b9e7cc481230f0a87a7bc8e9f20efafd3ad0f5d8efb1871ebd797a4a8a97ba865d071596fa364f4947545064523b
-
SSDEEP
49152:MrP47YP6TeGR02DmvUIJ4vkm70v+aV7Au6G8BqzBoxDTfL/6qTmNxDWeZH9svraE:K4m7lXc7U
Malware Config
Signatures
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2304 set thread context of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2820 RegSvcs.exe 2820 RegSvcs.exe 2820 RegSvcs.exe 2820 RegSvcs.exe 2820 RegSvcs.exe 2820 RegSvcs.exe 2820 RegSvcs.exe 2820 RegSvcs.exe 2820 RegSvcs.exe 2820 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30 PID 2304 wrote to memory of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30 PID 2304 wrote to memory of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30 PID 2304 wrote to memory of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30 PID 2304 wrote to memory of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30 PID 2304 wrote to memory of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30 PID 2304 wrote to memory of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30 PID 2304 wrote to memory of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30 PID 2304 wrote to memory of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30 PID 2304 wrote to memory of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30 PID 2304 wrote to memory of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30 PID 2304 wrote to memory of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30 PID 2304 wrote to memory of 2820 2304 ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe"C:\Users\Admin\AppData\Local\Temp\ad0a5f6965c05a5655f01c141c6a2e01a9c1808e03997ae3163329991946c5cf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-