Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 08:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
EdgeGuard Process Sentinel BETA.exe
Resource
win7-20230831-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
EdgeGuard Process Sentinel BETA.exe
Resource
win10v2004-20230915-en
4 signatures
150 seconds
General
-
Target
EdgeGuard Process Sentinel BETA.exe
-
Size
27.6MB
-
MD5
59385b378f6cb63f803264465445e7fe
-
SHA1
7dedb7a02e48bc3aec0ad62ed37dd3569dca5154
-
SHA256
049b812e346d0dcf53191b6c3b17f82d95350ec8fe7b878a721f52a13c16f4c0
-
SHA512
78ea498d21a221f28cbde3404deebf0513ac02bfeaca2350fdd1c47da30b9bd7bd6172a865bdb7e4cf0335e592c032eac1a7d866eae3c70700f035969e120b37
-
SSDEEP
196608:n7Xy6wxePDdfMvRNCPuioH6uulu8SBauV9oQmxV6Zfez:7Xv5pWP9ioeu4MoQmxAlez
Score
1/10
Malware Config
Signatures
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2204 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2204 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2428 EdgeGuard Process Sentinel BETA.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2204 2428 EdgeGuard Process Sentinel BETA.exe 29 PID 2428 wrote to memory of 2204 2428 EdgeGuard Process Sentinel BETA.exe 29 PID 2428 wrote to memory of 2204 2428 EdgeGuard Process Sentinel BETA.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\EdgeGuard Process Sentinel BETA.exe"C:\Users\Admin\AppData\Local\Temp\EdgeGuard Process Sentinel BETA.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\system32\tasklist.exetasklist /fo csv /nh2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2204
-