Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/09/2023, 15:51
Behavioral task
behavioral1
Sample
a4440a949a1877dc60a979b98af5a9550a6b4acfcdd722f3f466026338a76cb5.exe
Resource
win7-20230831-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a4440a949a1877dc60a979b98af5a9550a6b4acfcdd722f3f466026338a76cb5.exe
Resource
win10v2004-20230915-en
3 signatures
150 seconds
General
-
Target
a4440a949a1877dc60a979b98af5a9550a6b4acfcdd722f3f466026338a76cb5.exe
-
Size
1.4MB
-
MD5
c4be4879f10f94a451ee5de89f38ba67
-
SHA1
fd14f0d527ad32e23e6bd2c4b817841f0714cf51
-
SHA256
a4440a949a1877dc60a979b98af5a9550a6b4acfcdd722f3f466026338a76cb5
-
SHA512
59c8aa058fc9727b421472fde60d1a0dc16efd832d2c7bab9944eba19c5d61a73be4be329e4e273d83a718e85a9a6b7b1f2b5454fee4402bfc9eace913905674
-
SSDEEP
24576:mog4A7VKOCru29EifVP9Bc6HB0HAoKyZ2VWvLmbCN4ALKhRS3n:mogDKTu6VPH6f6usw4iKhR
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3056-0-0x0000000000400000-0x000000000083C000-memory.dmp upx behavioral1/memory/3056-1-0x0000000000400000-0x000000000083C000-memory.dmp upx behavioral1/memory/3056-4-0x0000000000400000-0x000000000083C000-memory.dmp upx behavioral1/memory/3056-5-0x0000000000400000-0x000000000083C000-memory.dmp upx behavioral1/memory/3056-6-0x0000000000400000-0x000000000083C000-memory.dmp upx behavioral1/memory/3056-7-0x0000000000400000-0x000000000083C000-memory.dmp upx behavioral1/memory/3056-10-0x0000000000400000-0x000000000083C000-memory.dmp upx behavioral1/memory/3056-11-0x0000000000400000-0x000000000083C000-memory.dmp upx behavioral1/memory/3056-12-0x0000000000400000-0x000000000083C000-memory.dmp upx behavioral1/memory/3056-13-0x0000000000400000-0x000000000083C000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3056 a4440a949a1877dc60a979b98af5a9550a6b4acfcdd722f3f466026338a76cb5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3056 a4440a949a1877dc60a979b98af5a9550a6b4acfcdd722f3f466026338a76cb5.exe 3056 a4440a949a1877dc60a979b98af5a9550a6b4acfcdd722f3f466026338a76cb5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4440a949a1877dc60a979b98af5a9550a6b4acfcdd722f3f466026338a76cb5.exe"C:\Users\Admin\AppData\Local\Temp\a4440a949a1877dc60a979b98af5a9550a6b4acfcdd722f3f466026338a76cb5.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3056