Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 19:29
Static task
static1
Behavioral task
behavioral1
Sample
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
Resource
win10v2004-20231127-en
General
-
Target
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
-
Size
754KB
-
MD5
0b85d0466bdc1272b82f2168d19fd2f9
-
SHA1
59e5fd69df55b8119f00f339cc291e8021d6c9e8
-
SHA256
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152
-
SHA512
104189a37f741bbc5bca9a84139a2e60eb93aa3416e0246741aea405c44dafa31c4b05e9b9c43bbf2472d071b9f9c905a8dc8765577ef515436c1ffa14a7fd40
-
SSDEEP
12288:RTnueH5qlyMP6sEvkRT8Zbb+rUL3H7ilvK3ZUz6VcwwlNVbxfnj+7IPG:RVqlYlk989Am7EK3ZHVuNr7U
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exepid process 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exedescription pid process Token: SeDebugPrivilege 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exedescription pid process target process PID 2512 wrote to memory of 2236 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2236 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2236 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2236 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2272 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2272 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2272 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2272 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 1400 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 1400 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 1400 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 1400 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2692 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2692 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2692 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2692 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2760 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2760 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2760 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe PID 2512 wrote to memory of 2760 2512 c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"C:\Users\Admin\AppData\Local\Temp\c17b773eb0165a627c7424b976ab4f8ce00ae810423587d1d7d14b539eeb8152exe.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2512-0-0x0000000000170000-0x0000000000232000-memory.dmpFilesize
776KB
-
memory/2512-1-0x0000000074700000-0x0000000074DEE000-memory.dmpFilesize
6.9MB
-
memory/2512-2-0x0000000004B50000-0x0000000004B90000-memory.dmpFilesize
256KB
-
memory/2512-3-0x0000000000740000-0x000000000075A000-memory.dmpFilesize
104KB
-
memory/2512-5-0x00000000006B0000-0x00000000006BA000-memory.dmpFilesize
40KB
-
memory/2512-4-0x00000000004E0000-0x00000000004E8000-memory.dmpFilesize
32KB
-
memory/2512-6-0x0000000005020000-0x000000000509C000-memory.dmpFilesize
496KB
-
memory/2512-7-0x0000000074700000-0x0000000074DEE000-memory.dmpFilesize
6.9MB