Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20-08-2023 11:36
Static task
static1
Behavioral task
behavioral1
Sample
54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe
-
Size
753KB
-
MD5
d0b5e28ea7fe6421a78f3e73c49ce5e2
-
SHA1
73c172755dfcc9b5762a7410497f4da86264a359
-
SHA256
54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96
-
SHA512
3332f4431b0ff9743de47ac7d412556010c529ca1b34ee2d0aa717b29e425312c8faac4e4c90172f19e69dcd7a782f9afc3613ffc365fde491be00485d492cb0
-
SSDEEP
12288:AtBCeu+x9twSZxex8EmVIXe5f+8xzPFXvpNMW4:UBCeu+5U6IO5W8xzdnMJ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2060 set thread context of 3004 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe 30 -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe 3004 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe Token: SeDebugPrivilege 3004 RegSvcs.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2060 wrote to memory of 3004 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe 30 PID 2060 wrote to memory of 3004 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe 30 PID 2060 wrote to memory of 3004 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe 30 PID 2060 wrote to memory of 3004 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe 30 PID 2060 wrote to memory of 3004 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe 30 PID 2060 wrote to memory of 3004 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe 30 PID 2060 wrote to memory of 3004 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe 30 PID 2060 wrote to memory of 3004 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe 30 PID 2060 wrote to memory of 3004 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe 30 PID 2060 wrote to memory of 3004 2060 54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe"C:\Users\Admin\AppData\Local\Temp\54ec929ab868528d647d285298b5ab71ef9aad83e1a3594b3d13f2a02f127d96_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-