Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 02:25
Static task
static1
Behavioral task
behavioral1
Sample
8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe
Resource
win10v2004-20231130-en
General
-
Target
8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe
-
Size
705KB
-
MD5
fe4748a98f462363b1edecea652667e5
-
SHA1
0d000f7ef9776870dab6e114736ca35ce411de94
-
SHA256
8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5
-
SHA512
b00097454e26faec77cfb0398332637a557c273ebb3ce18a5f7f0d74350a4b77079a1011563254dbf80904758d2f3e1d04727d7196901f1072968ef1ad6d438f
-
SSDEEP
12288:IueH5qY2/Cn1N/o8l4f/VM9TmzDkRqTvE4Iakqe7D/aoQJzpmFA9L:cqNC3ovf/VqkkRqTE4Iape6oQ5gFA9
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2228 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 28 PID 1288 wrote to memory of 2228 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 28 PID 1288 wrote to memory of 2228 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 28 PID 1288 wrote to memory of 2228 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 28 PID 1288 wrote to memory of 2288 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 29 PID 1288 wrote to memory of 2288 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 29 PID 1288 wrote to memory of 2288 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 29 PID 1288 wrote to memory of 2288 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 29 PID 1288 wrote to memory of 2020 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 32 PID 1288 wrote to memory of 2020 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 32 PID 1288 wrote to memory of 2020 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 32 PID 1288 wrote to memory of 2020 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 32 PID 1288 wrote to memory of 2188 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 31 PID 1288 wrote to memory of 2188 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 31 PID 1288 wrote to memory of 2188 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 31 PID 1288 wrote to memory of 2188 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 31 PID 1288 wrote to memory of 1068 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 30 PID 1288 wrote to memory of 1068 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 30 PID 1288 wrote to memory of 1068 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 30 PID 1288 wrote to memory of 1068 1288 8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe"C:\Users\Admin\AppData\Local\Temp\8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe"C:\Users\Admin\AppData\Local\Temp\8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe"2⤵PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe"C:\Users\Admin\AppData\Local\Temp\8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe"2⤵PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe"C:\Users\Admin\AppData\Local\Temp\8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe"2⤵PID:1068
-
-
C:\Users\Admin\AppData\Local\Temp\8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe"C:\Users\Admin\AppData\Local\Temp\8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe"2⤵PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe"C:\Users\Admin\AppData\Local\Temp\8ea12aa1982462766b00b54cbc5dae14db7034f2875cc3ad555158d65df189a5.exe"2⤵PID:2020
-