Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19-09-2023 10:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
windows7-x64
3 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
710KB
-
MD5
493562fc3240d634f797be4a433d72c7
-
SHA1
92569595aa0a20d9937bd03525a756dd35059d3b
-
SHA256
6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b
-
SHA512
70eb16d06d38d80cc4513962f6fbdeda54e6ec2bc30caa9fb112d3cd355b12c088426c823d3d4a3e315209b3fc908c0339e9cdc8de99462e87eba311f4801a75
-
SSDEEP
12288:406gna2iNP1UIkvEbtOgVt3KB6bxxXRZEG/p8fD5mcjtqlg6utz5l96OXaq:XTa1F14ot1aIxxAop+mc0g6MNa
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
tmp.exepid process 2200 tmp.exe 2200 tmp.exe 2200 tmp.exe 2200 tmp.exe 2200 tmp.exe 2200 tmp.exe 2200 tmp.exe 2200 tmp.exe 2200 tmp.exe 2200 tmp.exe 2200 tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tmp.exedescription pid process Token: SeDebugPrivilege 2200 tmp.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
tmp.exedescription pid process target process PID 2200 wrote to memory of 1972 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 1972 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 1972 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 1972 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2968 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2968 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2968 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2968 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2608 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2608 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2608 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2608 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2800 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2800 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2800 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2800 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2784 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2784 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2784 2200 tmp.exe tmp.exe PID 2200 wrote to memory of 2784 2200 tmp.exe tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵PID:2784
-