Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18/09/2023, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
41ff14d970caf2f4662ee223327fe591391f253855b91d70436f432a53da4aec.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
41ff14d970caf2f4662ee223327fe591391f253855b91d70436f432a53da4aec.exe
Resource
win10v2004-20230915-en
General
-
Target
41ff14d970caf2f4662ee223327fe591391f253855b91d70436f432a53da4aec.exe
-
Size
10.0MB
-
MD5
359622d861f14d9792c46249c4585e81
-
SHA1
5e257d6e6142adcc739b6fe6cef659409230cac0
-
SHA256
41ff14d970caf2f4662ee223327fe591391f253855b91d70436f432a53da4aec
-
SHA512
e2be47bc2ca3231efdcbded700955c56a8728548d3df926acff6b0385644282f495b485ed3999c620e72f6c6334380b1533a53df166a4b1cab9e0a169d5eaa80
-
SSDEEP
196608:JhtWb2Gnf+2gIYbHeBM1eEpRr6rSNJSiAgHbOnQlnyb+kMSAWSspriN/P:ftWNdgFbHk1EpR+GNlA+KUkMSAWSgriR
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2160 41ff14d970caf2f4662ee223327fe591391f253855b91d70436f432a53da4aec.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2160 41ff14d970caf2f4662ee223327fe591391f253855b91d70436f432a53da4aec.exe 2160 41ff14d970caf2f4662ee223327fe591391f253855b91d70436f432a53da4aec.exe 2160 41ff14d970caf2f4662ee223327fe591391f253855b91d70436f432a53da4aec.exe 2160 41ff14d970caf2f4662ee223327fe591391f253855b91d70436f432a53da4aec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41ff14d970caf2f4662ee223327fe591391f253855b91d70436f432a53da4aec.exe"C:\Users\Admin\AppData\Local\Temp\41ff14d970caf2f4662ee223327fe591391f253855b91d70436f432a53da4aec.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2160
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\41ff14d970caf2f4662ee223327fe591391f253855b91d70436f432a53da4aec.exepack.tmp
Filesize2KB
MD51618120d47974256f1523d8fad891704
SHA1179e5243c89a70e9d7a7beeadedd361b3c646ab0
SHA256d3a8fb8276852b1c5c43ed5f32d8a512259e974ccde00cd708f27f7dec0a410a
SHA5121ba09fe328b285ea6291831cc8d5250c858fda1f46cfd1ebb79c71fb075add5866e2627d622972ab39d236946a6d835adbf67ebe59f19caad21f4739dd13509d
-
Filesize
1KB
MD5bf6f565e5fd2f486d8452fcfba184cf1
SHA17d431f1d319744cb57bedd4900d63d7cd00bee74
SHA25682424499de69475fc2712b2215ef5be6a97c2ab2bf0cb3c5ded03a269641cba1
SHA5122616f664665dc3574282067ccf3970c3940e53f4f2bfbeb012148dfb0b1f16169f61653a5e60ca8d4182e925922dd91c5fe598ed6d5e2c2d7dd9d631bd7795c8
-
Filesize
1KB
MD5f570533c0855e862bf1b13fe8cc60906
SHA1daf0d9fa18f267ac5794f8f05893061aa1daf20a
SHA256d570de82e6ebc6088ba8f6dcb4748773997a3e51f6e557d98af4dcf562cb95e4
SHA51273ebb27dcd41aad0d7fa8f644da5ea094aa27667d1ad78442637839e0557ca7fb94c3ae1e0c57bce01dac98ce294a769a77cbc808aa3b746fd81a5c444291b77