Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 05:42
Static task
static1
Behavioral task
behavioral1
Sample
eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe
-
Size
422KB
-
MD5
baa7d232d3b9b73538e925b4fa524610
-
SHA1
ad4ac32df3c9f3f6fe82d171123c2c03c12cb475
-
SHA256
eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc
-
SHA512
39053e5c0772d731dc31bab86830df2e3a6b0e099747ec407f587357d9914e738c00e5682f243549105187cda8fc7c44679548e75f50cb8ce39ff2960ca64929
-
SSDEEP
6144:MUagfY5/mIr3CE/87qLpFAOcu8DUXCYyvumtFJ2o41AW3UFWW6O:MxgfQOIT9XK9DWCY2jtBKkWW6
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2812 set thread context of 3064 2812 eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 2628 2812 WerFault.exe 81 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2012 svchost.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2812 wrote to memory of 3064 2812 eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe 83 PID 2812 wrote to memory of 3064 2812 eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe 83 PID 2812 wrote to memory of 3064 2812 eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe 83 PID 2812 wrote to memory of 3064 2812 eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe 83 PID 2812 wrote to memory of 3064 2812 eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe 83 PID 2812 wrote to memory of 3064 2812 eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe 83 PID 2812 wrote to memory of 3064 2812 eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe 83 PID 2812 wrote to memory of 3064 2812 eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe 83 PID 2812 wrote to memory of 3064 2812 eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe 83 PID 2812 wrote to memory of 3064 2812 eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe"C:\Users\Admin\AppData\Local\Temp\eecd9c24809a27a847d2f1f747cf99228bc764a5b50fad5852dd6cdf68b187dc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 4042⤵
- Program crash
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2812 -ip 28121⤵PID:740
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:4208
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2012