Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 19:29
Static task
static1
Behavioral task
behavioral1
Sample
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
Resource
win10v2004-20231127-en
General
-
Target
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
-
Size
754KB
-
MD5
0b85d0466bdc1272b82f2168d19fd2f9
-
SHA1
59e5fd69df55b8119f00f339cc291e8021d6c9e8
-
SHA256
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152
-
SHA512
104189a37f741bbc5bca9a84139a2e60eb93aa3416e0246741aea405c44dafa31c4b05e9b9c43bbf2472d071b9f9c905a8dc8765577ef515436c1ffa14a7fd40
-
SSDEEP
12288:RTnueH5qlyMP6sEvkRT8Zbb+rUL3H7ilvK3ZUz6VcwwlNVbxfnj+7IPG:RVqlYlk989Am7EK3ZHVuNr7U
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2236 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 28 PID 2512 wrote to memory of 2236 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 28 PID 2512 wrote to memory of 2236 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 28 PID 2512 wrote to memory of 2236 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 28 PID 2512 wrote to memory of 2272 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 32 PID 2512 wrote to memory of 2272 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 32 PID 2512 wrote to memory of 2272 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 32 PID 2512 wrote to memory of 2272 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 32 PID 2512 wrote to memory of 1400 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 31 PID 2512 wrote to memory of 1400 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 31 PID 2512 wrote to memory of 1400 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 31 PID 2512 wrote to memory of 1400 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 31 PID 2512 wrote to memory of 2692 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 30 PID 2512 wrote to memory of 2692 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 30 PID 2512 wrote to memory of 2692 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 30 PID 2512 wrote to memory of 2692 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 30 PID 2512 wrote to memory of 2760 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 29 PID 2512 wrote to memory of 2760 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 29 PID 2512 wrote to memory of 2760 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 29 PID 2512 wrote to memory of 2760 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"2⤵PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"2⤵PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"2⤵PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"2⤵PID:1400
-
-
C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"2⤵PID:2272
-