Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
11/12/2023, 15:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Product Sample.exe
Resource
win7-20231201-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Product Sample.exe
Resource
win10v2004-20231127-en
3 signatures
150 seconds
General
-
Target
Product Sample.exe
-
Size
704KB
-
MD5
af94befdf947e87fca2be99067904e49
-
SHA1
f13892602f146b2a91785fea855a321365be2aed
-
SHA256
1b126e2fb116a33fa5831da41c224e4c1213fb7af5738b244d0fa25a5a252a99
-
SHA512
97b397d9d1ade3f3e896fac210c4d012303b17f16e30cb128bd8007c71fd6bcdbf525923fffa42ea7fa03146cc056043afef2101efcc2efb812f22408e0a4b4a
-
SSDEEP
6144:G3RWHKuZ5WlcYIsyF1OiAMrV3Psy4S9hDnz7d8z77fy2zmlt2L9OrFZA5EhQNUo:GhkZ5zxF1OiAMrVfsNS9hDPdAPGl+cS
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2044 Product Sample.exe 2044 Product Sample.exe 2044 Product Sample.exe 2044 Product Sample.exe 2044 Product Sample.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2044 Product Sample.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2916 2044 Product Sample.exe 28 PID 2044 wrote to memory of 2916 2044 Product Sample.exe 28 PID 2044 wrote to memory of 2916 2044 Product Sample.exe 28 PID 2044 wrote to memory of 2916 2044 Product Sample.exe 28 PID 2044 wrote to memory of 2820 2044 Product Sample.exe 29 PID 2044 wrote to memory of 2820 2044 Product Sample.exe 29 PID 2044 wrote to memory of 2820 2044 Product Sample.exe 29 PID 2044 wrote to memory of 2820 2044 Product Sample.exe 29 PID 2044 wrote to memory of 2772 2044 Product Sample.exe 30 PID 2044 wrote to memory of 2772 2044 Product Sample.exe 30 PID 2044 wrote to memory of 2772 2044 Product Sample.exe 30 PID 2044 wrote to memory of 2772 2044 Product Sample.exe 30 PID 2044 wrote to memory of 2740 2044 Product Sample.exe 31 PID 2044 wrote to memory of 2740 2044 Product Sample.exe 31 PID 2044 wrote to memory of 2740 2044 Product Sample.exe 31 PID 2044 wrote to memory of 2740 2044 Product Sample.exe 31 PID 2044 wrote to memory of 3020 2044 Product Sample.exe 32 PID 2044 wrote to memory of 3020 2044 Product Sample.exe 32 PID 2044 wrote to memory of 3020 2044 Product Sample.exe 32 PID 2044 wrote to memory of 3020 2044 Product Sample.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Product Sample.exe"C:\Users\Admin\AppData\Local\Temp\Product Sample.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Product Sample.exe"C:\Users\Admin\AppData\Local\Temp\Product Sample.exe"2⤵PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\Product Sample.exe"C:\Users\Admin\AppData\Local\Temp\Product Sample.exe"2⤵PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\Product Sample.exe"C:\Users\Admin\AppData\Local\Temp\Product Sample.exe"2⤵PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\Product Sample.exe"C:\Users\Admin\AppData\Local\Temp\Product Sample.exe"2⤵PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\Product Sample.exe"C:\Users\Admin\AppData\Local\Temp\Product Sample.exe"2⤵PID:3020
-