Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
24-09-2023 00:28
Behavioral task
behavioral1
Sample
ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe
-
Size
3.3MB
-
MD5
3b9540a5746c3b9400b2cc94cab3ef52
-
SHA1
1116197f1113ad3aded50c9871d78756bc74a582
-
SHA256
ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3
-
SHA512
e4f4ba66b4528c552cdf01e59f2f5930622ea6af84a1ad880c56dd18276d9aab52dde8368bfaf1e67ca245f08fc5b9f70ba32e7b3c77b280eb30830f37383b06
-
SSDEEP
98304:gp3xJ8spwYF1LjUp5SbFI5Y6YI6QlsuRThXZuARZC:ZlYzwiFI+2bhJI
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2124-0-0x0000000000400000-0x0000000000AEA000-memory.dmp vmprotect behavioral1/memory/2124-3-0x0000000000400000-0x0000000000AEA000-memory.dmp vmprotect behavioral1/memory/2124-14-0x0000000000400000-0x0000000000AEA000-memory.dmp vmprotect behavioral1/memory/2124-15-0x0000000000400000-0x0000000000AEA000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2124 ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe 2124 ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2124 ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe 2124 ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe 2124 ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2124 ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2124 ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2124 ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe 2124 ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe"C:\Users\Admin\AppData\Local\Temp\ee82dcf6694719c1df6bc307ee4ac5bc75c4eae0a40f9e7a3b0790739c359eb3.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2124