Analysis
-
max time kernel
120s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
28-10-2023 17:26
Behavioral task
behavioral1
Sample
1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe
Resource
win7-20231025-en
windows7-x64
4 signatures
150 seconds
General
-
Target
1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe
-
Size
736KB
-
MD5
5195af2fe223c4d237e3e5a5148a0771
-
SHA1
c141e093cc523d57bf27f00630da0989104a025c
-
SHA256
1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5
-
SHA512
0dd7c92ade95f0da48e14fe34e2b251d30f4ec1b181a0e4fd2e6090c40175aff38ce820c08af09eade063c0daea9e527578aa122cb867a0363d70a47dc666af7
-
SSDEEP
12288:1/n+KsUpF5A2fRHbsnQf5EwOxlDyR5G1Pl:1/n+KsUpFZR84OxgLGt
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2596-1-0x00000000002D0000-0x00000000002DB000-memory.dmp upx behavioral1/memory/2596-0-0x00000000002D0000-0x00000000002DB000-memory.dmp upx behavioral1/memory/2596-4-0x00000000005E0000-0x00000000005EB000-memory.dmp upx behavioral1/memory/2596-3-0x00000000005E0000-0x00000000005EB000-memory.dmp upx behavioral1/memory/2596-34-0x00000000002D0000-0x00000000002DB000-memory.dmp upx behavioral1/memory/2596-35-0x00000000005E0000-0x00000000005EB000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2596 1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe 2596 1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe 2596 1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe 2596 1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe 2596 1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe 2596 1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2596 1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe Token: SeDebugPrivilege 2596 1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe Token: SeDebugPrivilege 2596 1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2596 1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe"C:\Users\Admin\AppData\Local\Temp\1296c3f25eca0e0c4d963fb1df1bd735b2540fdb3fa83f530ecc15ca8db441e5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2596