Analysis
-
max time kernel
117s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 12:58
Static task
static1
Behavioral task
behavioral1
Sample
92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe
Resource
win10v2004-20230915-en
General
-
Target
92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe
-
Size
7.3MB
-
MD5
8e3452a086300b39d86e3c268c3c971e
-
SHA1
164f833322739455e53875eefd9f36d4515bd8c7
-
SHA256
92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52
-
SHA512
b9aefa52793bb4c0ef0c9f6d537ec0d6ada48dec105ee21566e04829c0011e65b232a7c8d80fdd3aa55bbd8286a19fe2d4aaee1d143c601da104547df3612246
-
SSDEEP
196608:DRYCFTc+fAbwYtgxeYnC0sTuftpt3bNuSiUPzx:DbFIKBaGwTaNuSVx
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exedescription pid process Token: SeDebugPrivilege 1248 92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exepid process 1248 92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe 1248 92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exedescription pid process target process PID 1248 wrote to memory of 2280 1248 92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe regsvr32.exe PID 1248 wrote to memory of 2280 1248 92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe regsvr32.exe PID 1248 wrote to memory of 2280 1248 92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe regsvr32.exe PID 1248 wrote to memory of 2280 1248 92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe regsvr32.exe PID 1248 wrote to memory of 2280 1248 92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe regsvr32.exe PID 1248 wrote to memory of 2280 1248 92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe regsvr32.exe PID 1248 wrote to memory of 2280 1248 92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe"C:\Users\Admin\AppData\Local\Temp\92fb01656d0676556c36e446919d5a99b2cbf788dd537b0cdac38adcba9c8e52.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s dm.dll2⤵PID:2280
-