Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2023 14:37
Behavioral task
behavioral1
Sample
e9ff848877955ba6fc2189f0aa894a4f7e94b849a4737c74c00972d6bb584a15.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e9ff848877955ba6fc2189f0aa894a4f7e94b849a4737c74c00972d6bb584a15.exe
Resource
win10v2004-20230703-en
General
-
Target
e9ff848877955ba6fc2189f0aa894a4f7e94b849a4737c74c00972d6bb584a15.exe
-
Size
244KB
-
MD5
7f75e593d8e12a42825c20429b6402f4
-
SHA1
97df5a1ac43ad9857cf2be66eb4e4a32c7846984
-
SHA256
e9ff848877955ba6fc2189f0aa894a4f7e94b849a4737c74c00972d6bb584a15
-
SHA512
29ac0d1dbf51344b10174800b22415e3d0ad822b4a447a7e0b1b265f9556b939c0e331a9df84fbf13b4fd7017339fb3d6740bf474b775290bce516b2232b92fe
-
SSDEEP
6144:hh5cZAew9Ic9fquaP0LGMmWw8t33PKZKv0OT:eZiZM8L+Wtt33PsKv04
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3368-133-0x00007FF7D0500000-0x00007FF7D0648000-memory.dmp upx behavioral2/memory/3368-136-0x00007FF7D0500000-0x00007FF7D0648000-memory.dmp upx -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 7 Scripting Hero -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3368 e9ff848877955ba6fc2189f0aa894a4f7e94b849a4737c74c00972d6bb584a15.exe Token: SeDebugPrivilege 3368 e9ff848877955ba6fc2189f0aa894a4f7e94b849a4737c74c00972d6bb584a15.exe Token: SeCreateGlobalPrivilege 3368 e9ff848877955ba6fc2189f0aa894a4f7e94b849a4737c74c00972d6bb584a15.exe