Analysis
-
max time kernel
32s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 13:08
Behavioral task
behavioral1
Sample
dropper_cs.exe
Resource
win7-20230831-en
windows7-x64
4 signatures
150 seconds
General
-
Target
dropper_cs.exe
-
Size
18KB
-
MD5
54628e3d4956efcbce04ebdd20eb5342
-
SHA1
9cfbec77418ef8572619928e055331a62ea31eee
-
SHA256
a51a7662d835e2db5159392b104f7e30cfa931341d3bf7c30d5667c7c2b3397f
-
SHA512
796d014f8eedf2a056ada9ade04fdd0e147e199f9c01e7a11c15d5cf4f561be4da7fd12d859e17239d77919cf7162081be6f1015bb26227ab23adf8c9cf1eb7b
-
SSDEEP
384:mR1O1HfA6c76wQ/J1O95acb43vK4oTb7VnwbN/4wy/jKXuQT:oY1YUBcfVneGrKXHT
Malware Config
Signatures
-
PoshC2 binary 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2272-0-0x0000000001080000-0x000000000108A000-memory.dmp family_poshc2 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
dropper_cs.exepid process 2272 dropper_cs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dropper_cs.exedescription pid process Token: SeDebugPrivilege 2272 dropper_cs.exe