Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
17-11-2023 06:40
Static task
static1
Behavioral task
behavioral1
Sample
15aed13927b5aa05cf0c67a04c581dbdf7f7a396761cc5265d096be7f908eab4.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
15aed13927b5aa05cf0c67a04c581dbdf7f7a396761cc5265d096be7f908eab4.exe
Resource
win10v2004-20231023-en
General
-
Target
15aed13927b5aa05cf0c67a04c581dbdf7f7a396761cc5265d096be7f908eab4.exe
-
Size
1.6MB
-
MD5
f4285ddd8f78ffeefe2acafcd3197d50
-
SHA1
78c31bc506710b3cd57d5f942514be357418fff5
-
SHA256
15aed13927b5aa05cf0c67a04c581dbdf7f7a396761cc5265d096be7f908eab4
-
SHA512
60ea68fcf3075ae8d78539d8440a414d002e581bb2449db6ae41e9ba54bc48f13451dbf735dce4fa9cd95a495b8b25af564514099c831f081bce4c0ebb423eab
-
SSDEEP
49152:+Lvp0f/7eZuFvjT++LG9rSTCqYUUfUvXolNWQQLYp:Svs/7e0FvjT++LGdiCqYUfvokQQU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2800 15aed13927b5aa05cf0c67a04c581dbdf7f7a396761cc5265d096be7f908eab4.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2800 15aed13927b5aa05cf0c67a04c581dbdf7f7a396761cc5265d096be7f908eab4.exe 2800 15aed13927b5aa05cf0c67a04c581dbdf7f7a396761cc5265d096be7f908eab4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15aed13927b5aa05cf0c67a04c581dbdf7f7a396761cc5265d096be7f908eab4.exe"C:\Users\Admin\AppData\Local\Temp\15aed13927b5aa05cf0c67a04c581dbdf7f7a396761cc5265d096be7f908eab4.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2800