Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
08-12-2023 14:13
Static task
static1
Behavioral task
behavioral1
Sample
54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe
Resource
win10v2004-20231130-en
General
-
Target
54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe
-
Size
1.1MB
-
MD5
39f497b2105f95ecb36ea2915c63e5d1
-
SHA1
46d0194da9cbc26bb284e4d0fd75a27e9de7c02f
-
SHA256
54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da
-
SHA512
b1430b63be3e83b32473490da06da95ca562b914eead736a7b108b97ef160d08a37ec67a0d2006e2a31f88c6e5613ad7ebe88eddc48a4c78907554c15577b584
-
SSDEEP
24576:401tD/F2k78gfdqpcorMhs0YdWdfIHdsu:dngk78gtoYsTEGHu
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exepid process 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exedescription pid process Token: SeDebugPrivilege 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exedescription pid process target process PID 1884 wrote to memory of 2840 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2840 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2840 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2840 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2852 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2852 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2852 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2852 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2848 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2848 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2848 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2848 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2824 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2824 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2824 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2824 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2732 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2732 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2732 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe PID 1884 wrote to memory of 2732 1884 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe 54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe"C:\Users\Admin\AppData\Local\Temp\54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe"C:\Users\Admin\AppData\Local\Temp\54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe"2⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe"C:\Users\Admin\AppData\Local\Temp\54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe"2⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe"C:\Users\Admin\AppData\Local\Temp\54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe"2⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe"C:\Users\Admin\AppData\Local\Temp\54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe"2⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe"C:\Users\Admin\AppData\Local\Temp\54ce95d725c09dd032c5ded51dc6e2a6640cfeafced81b587c61c9fe14d2a7da.exe"2⤵PID:2732