Analysis
-
max time kernel
196s -
max time network
171s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 06:14
Behavioral task
behavioral1
Sample
6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe
Resource
win10v2004-20230915-en
General
-
Target
6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe
-
Size
1.5MB
-
MD5
8b8b32a1a71fb71b19f45936eda0d068
-
SHA1
7dcca9ba97aa672c4a5d35035a82ed7208341931
-
SHA256
6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2
-
SHA512
0f8b3d8857fa96f4b314ae5bcdc1dfc03b781910a9867a23a28919ed3502e700e52b58b49332dcf38d9c73b055bc00ce7b75f4e2a625db8675e0c4f43142acf9
-
SSDEEP
24576:CHiFC8GU//crmpiLGRy7Z2rc3zZOiNXHoJqzS9pG5sDOJHtfsgBD6WauVk4GbaPs:CZEOyM2+gitqueGltZD0OJGbaI376q
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2348-0-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-3-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-4-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-5-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-6-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-7-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-8-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-9-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-10-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-11-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-12-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-13-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-14-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-15-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-16-0x0000000000400000-0x0000000000ADD000-memory.dmp upx behavioral1/memory/2348-17-0x0000000000400000-0x0000000000ADD000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: 33 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe Token: SeIncBasePriorityPrivilege 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe 2348 6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe"C:\Users\Admin\AppData\Local\Temp\6f9f7ca46870fcb34a1006294554228c6a593111bfcad87c78ce70d7778b16e2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2348