Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
31/08/2023, 11:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
met.exe
Resource
win7-20230712-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
met.exe
Resource
win10v2004-20230703-en
4 signatures
150 seconds
General
-
Target
met.exe
-
Size
1.2MB
-
MD5
a8558d6b6d80af8d991a468bb1b4b2b5
-
SHA1
f9416cb8e7535643f86c5a3540642fe0fb0b09d0
-
SHA256
16fbabbe3842fee9262fd42da0151f81e4375652d59b01f75a1f0dff46cda69f
-
SHA512
5e2938735a9d429acda33a2c4c30c07131df13ad62360db897bb178988471457cc0b2d4a046c31f6b6d1794331abd90112d5b9285b02956ba2479aaea181fc7f
-
SSDEEP
6144:4AFObyV0RWeTKO40HAOWZ4s+H1CCZnvYO6yq2u8erIUfc:VsbyGHTq0kZ3aNZnvYWJuv1fc
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2512 set thread context of 2056 2512 met.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2056 InstallUtil.exe 2056 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2056 InstallUtil.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2056 2512 met.exe 29 PID 2512 wrote to memory of 2056 2512 met.exe 29 PID 2512 wrote to memory of 2056 2512 met.exe 29 PID 2512 wrote to memory of 2056 2512 met.exe 29 PID 2512 wrote to memory of 2056 2512 met.exe 29 PID 2512 wrote to memory of 2056 2512 met.exe 29 PID 2512 wrote to memory of 2056 2512 met.exe 29 PID 2512 wrote to memory of 2056 2512 met.exe 29 PID 2512 wrote to memory of 2056 2512 met.exe 29 PID 2512 wrote to memory of 2056 2512 met.exe 29 PID 2512 wrote to memory of 2056 2512 met.exe 29 PID 2512 wrote to memory of 2056 2512 met.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\met.exe"C:\Users\Admin\AppData\Local\Temp\met.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-