Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
19/11/2023, 02:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8.exe
Resource
win7-20231023-en
4 signatures
150 seconds
General
-
Target
8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8.exe
-
Size
1.1MB
-
MD5
6c96ccf38c6d85d8e315d28edfd4c253
-
SHA1
5f048aa4d4bb1a3a87e792229d32212a10a8b01f
-
SHA256
8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8
-
SHA512
512b141f5c5e9769047f83a9a38c3443f62580756508a04e91253bcbd8d3fdfb8812bfd016693d903539e7101b2626cb9bce19b3aaf91326e464ea11efa2c7d0
-
SSDEEP
24576:EGtlqk+CxO2+z8EUk41xOvK/CTyBkJ4q1c+xXZRj:EGtlqk+X2y8OfvVGBkJz1cKZ
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2496 8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeBackupPrivilege 2496 8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8.exe Token: SeRestorePrivilege 2496 8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8.exe Token: SeManageVolumePrivilege 2496 8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8.exe Token: SeSecurityPrivilege 2496 8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8.exe Token: 35 2496 8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2496 8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8.exe 2496 8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8.exe"C:\Users\Admin\AppData\Local\Temp\8b1d14a4b99d9d8342915fddb3d7641c53ebb23cb8f38284f2aef26829eb03c8.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2496