Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 04:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
060eef088a44cca9f650fdcd2d6d79b0.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
060eef088a44cca9f650fdcd2d6d79b0.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
060eef088a44cca9f650fdcd2d6d79b0.exe
-
Size
149KB
-
MD5
060eef088a44cca9f650fdcd2d6d79b0
-
SHA1
3d5f963998ac2eb0bb55c222ce56d7477d562236
-
SHA256
5d6c88f368093afd6f79540fbd259804c62c6238b2fe9d529b467a0020957d46
-
SHA512
a217a7f19c29a47ad437843f103df8afaddfea9dc64cef8b6bc4682de859d0d1085f9f2bd5c195902d1babbc78c446aee37437ddc7535fd6d77c2fe4397a2c35
-
SSDEEP
3072:+1YEPRoip3YDYvJPbHVYOY1dZaioWEZHoj4sVf3qGba6Em:QYAyeIDYvJPbaO4DaiLyHSb/ban
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2232 060eef088a44cca9f650fdcd2d6d79b0.exe Token: SeDebugPrivilege 2348 060eef088a44cca9f650fdcd2d6d79b0.exe Token: SeDebugPrivilege 2884 060eef088a44cca9f650fdcd2d6d79b0.exe Token: SeDebugPrivilege 2500 060eef088a44cca9f650fdcd2d6d79b0.exe Token: SeDebugPrivilege 1960 060eef088a44cca9f650fdcd2d6d79b0.exe Token: SeDebugPrivilege 2636 060eef088a44cca9f650fdcd2d6d79b0.exe Token: SeDebugPrivilege 1240 060eef088a44cca9f650fdcd2d6d79b0.exe Token: SeDebugPrivilege 2056 060eef088a44cca9f650fdcd2d6d79b0.exe Token: SeDebugPrivilege 620 060eef088a44cca9f650fdcd2d6d79b0.exe Token: SeDebugPrivilege 1268 060eef088a44cca9f650fdcd2d6d79b0.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2348 2232 060eef088a44cca9f650fdcd2d6d79b0.exe 28 PID 2232 wrote to memory of 2348 2232 060eef088a44cca9f650fdcd2d6d79b0.exe 28 PID 2232 wrote to memory of 2348 2232 060eef088a44cca9f650fdcd2d6d79b0.exe 28 PID 2348 wrote to memory of 2884 2348 060eef088a44cca9f650fdcd2d6d79b0.exe 29 PID 2348 wrote to memory of 2884 2348 060eef088a44cca9f650fdcd2d6d79b0.exe 29 PID 2348 wrote to memory of 2884 2348 060eef088a44cca9f650fdcd2d6d79b0.exe 29 PID 2884 wrote to memory of 2500 2884 060eef088a44cca9f650fdcd2d6d79b0.exe 30 PID 2884 wrote to memory of 2500 2884 060eef088a44cca9f650fdcd2d6d79b0.exe 30 PID 2884 wrote to memory of 2500 2884 060eef088a44cca9f650fdcd2d6d79b0.exe 30 PID 2500 wrote to memory of 1960 2500 060eef088a44cca9f650fdcd2d6d79b0.exe 33 PID 2500 wrote to memory of 1960 2500 060eef088a44cca9f650fdcd2d6d79b0.exe 33 PID 2500 wrote to memory of 1960 2500 060eef088a44cca9f650fdcd2d6d79b0.exe 33 PID 1960 wrote to memory of 2636 1960 060eef088a44cca9f650fdcd2d6d79b0.exe 34 PID 1960 wrote to memory of 2636 1960 060eef088a44cca9f650fdcd2d6d79b0.exe 34 PID 1960 wrote to memory of 2636 1960 060eef088a44cca9f650fdcd2d6d79b0.exe 34 PID 2636 wrote to memory of 1240 2636 060eef088a44cca9f650fdcd2d6d79b0.exe 35 PID 2636 wrote to memory of 1240 2636 060eef088a44cca9f650fdcd2d6d79b0.exe 35 PID 2636 wrote to memory of 1240 2636 060eef088a44cca9f650fdcd2d6d79b0.exe 35 PID 1240 wrote to memory of 2056 1240 060eef088a44cca9f650fdcd2d6d79b0.exe 36 PID 1240 wrote to memory of 2056 1240 060eef088a44cca9f650fdcd2d6d79b0.exe 36 PID 1240 wrote to memory of 2056 1240 060eef088a44cca9f650fdcd2d6d79b0.exe 36 PID 2056 wrote to memory of 620 2056 060eef088a44cca9f650fdcd2d6d79b0.exe 37 PID 2056 wrote to memory of 620 2056 060eef088a44cca9f650fdcd2d6d79b0.exe 37 PID 2056 wrote to memory of 620 2056 060eef088a44cca9f650fdcd2d6d79b0.exe 37 PID 620 wrote to memory of 1268 620 060eef088a44cca9f650fdcd2d6d79b0.exe 38 PID 620 wrote to memory of 1268 620 060eef088a44cca9f650fdcd2d6d79b0.exe 38 PID 620 wrote to memory of 1268 620 060eef088a44cca9f650fdcd2d6d79b0.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"7⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"8⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"9⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"C:\Users\Admin\AppData\Local\Temp\060eef088a44cca9f650fdcd2d6d79b0.exe"10⤵
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
-
-
-
-
-
-
-