Analysis
-
max time kernel
590s -
max time network
615s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2023 15:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
123.exe
Resource
win7-20231023-en
windows7-x64
3 signatures
600 seconds
Behavioral task
behavioral2
Sample
123.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
3 signatures
600 seconds
General
-
Target
123.exe
-
Size
4.1MB
-
MD5
1940141f673cf5536ff354391ff0f05f
-
SHA1
17e1c27edb8a1c0414db9ed4a1191a362f1b9d6f
-
SHA256
c2c3665fcc34cfb52d73b9b5c28f04b3ce1c0d585dceb614d3759626d1326631
-
SHA512
c9b9e42443c7fb773291e17e81a76fa1737134ee123d4666b259178b2c28e726493656d9920990e888e11cd969bc79f6336bdc6894d8ff33d9d756d1d6fbfc78
-
SSDEEP
98304:MGAavs46NdN7YJhb1l3dL1NzpOnnhgdTZmaZ9kYNX9AHD8YgDCyi1cQJXu25+Z2X:MG3vUhYJTl3d5NVOnhgdTZlZ9kYNX9CN
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2064 set thread context of 3784 2064 123.exe 93 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2064 123.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2064 wrote to memory of 3784 2064 123.exe 93 PID 2064 wrote to memory of 3784 2064 123.exe 93 PID 2064 wrote to memory of 3784 2064 123.exe 93 PID 2064 wrote to memory of 3784 2064 123.exe 93 PID 2064 wrote to memory of 3784 2064 123.exe 93 PID 2064 wrote to memory of 3784 2064 123.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\123.exe"C:\Users\Admin\AppData\Local\Temp\123.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\123.exeC:\Users\Admin\AppData\Local\Temp\123.exe2⤵PID:3784
-