Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 04:04
Static task
static1
Behavioral task
behavioral1
Sample
78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe
-
Size
494KB
-
MD5
5e86e15a56455a7b230d2a934ad129a5
-
SHA1
6b0a1beffe90cf58d1e442612458d18b59a852a4
-
SHA256
78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce
-
SHA512
6dc0c23f825a36db50adf41795a2da3ae962ebd9eef07a923e629a8a32ac2a7aff87e19f1682a259cde6aa83c13c41e7e5ce4f7988680feaaedbe049208401e5
-
SSDEEP
12288:wWwjzdKu2piK6lVOx7j5S8U9a/tUvuNX7Y:Pwjzd+gE99XAC
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exedescription pid process target process PID 2124 set thread context of 2208 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2704 2208 WerFault.exe 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exepid process 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exedescription pid process Token: SeDebugPrivilege 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exedescription pid process target process PID 2124 wrote to memory of 2208 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe PID 2124 wrote to memory of 2208 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe PID 2124 wrote to memory of 2208 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe PID 2124 wrote to memory of 2208 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe PID 2124 wrote to memory of 2208 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe PID 2124 wrote to memory of 2208 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe PID 2124 wrote to memory of 2208 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe PID 2124 wrote to memory of 2208 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe PID 2124 wrote to memory of 2208 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe PID 2124 wrote to memory of 2208 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe PID 2124 wrote to memory of 2208 2124 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe PID 2208 wrote to memory of 2704 2208 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe WerFault.exe PID 2208 wrote to memory of 2704 2208 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe WerFault.exe PID 2208 wrote to memory of 2704 2208 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe WerFault.exe PID 2208 wrote to memory of 2704 2208 78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe"C:\Users\Admin\AppData\Local\Temp\78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exeC:\Users\Admin\AppData\Local\Temp\78732997a6c9d975b97da85fc511533d44083a9f9da60dae8393274a59b7bfce_JC.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 1643⤵
- Program crash
PID:2704