Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 09:57
Behavioral task
behavioral1
Sample
159449b2dd57a7b0ed9e455ace3a6ea2.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
159449b2dd57a7b0ed9e455ace3a6ea2.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
159449b2dd57a7b0ed9e455ace3a6ea2.exe
-
Size
9KB
-
MD5
159449b2dd57a7b0ed9e455ace3a6ea2
-
SHA1
1e1d26eed9aa8735b60549b8825b28509f75b720
-
SHA256
cffff4b5898e77809e88e1bec10fa158465429807aed743e91a7584fe57eeaef
-
SHA512
c25910c7cbb14266470238433e160b3696e3c1843daf03e373373c5ac77c3c76eaa64ff606ef5e36e83bc454bd2391f0d0d9ef7882adbfb11a3bdba0bf734969
-
SSDEEP
192:RUubub5vj2/hR5QWAIuWbhb9m8ypR2s25Y:Oub8J2/D5Vx1bs8OB25Y
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2620 cmd.exe -
resource yara_rule behavioral1/memory/1708-0-0x00000000003E0000-0x000000000040D000-memory.dmp upx behavioral1/memory/1708-1-0x00000000003E0000-0x000000000040D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1708 159449b2dd57a7b0ed9e455ace3a6ea2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2620 1708 159449b2dd57a7b0ed9e455ace3a6ea2.exe 34 PID 1708 wrote to memory of 2620 1708 159449b2dd57a7b0ed9e455ace3a6ea2.exe 34 PID 1708 wrote to memory of 2620 1708 159449b2dd57a7b0ed9e455ace3a6ea2.exe 34 PID 1708 wrote to memory of 2620 1708 159449b2dd57a7b0ed9e455ace3a6ea2.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\159449b2dd57a7b0ed9e455ace3a6ea2.exe"C:\Users\Admin\AppData\Local\Temp\159449b2dd57a7b0ed9e455ace3a6ea2.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\159449~1.EXE > nul2⤵
- Deletes itself
PID:2620
-