Analysis
-
max time kernel
5s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 17:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
30b2d9c3ba898b1f79d9128c18b0a16e.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
30b2d9c3ba898b1f79d9128c18b0a16e.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
30b2d9c3ba898b1f79d9128c18b0a16e.exe
-
Size
15KB
-
MD5
30b2d9c3ba898b1f79d9128c18b0a16e
-
SHA1
50417042b69d4b42ca6635b75de33484b311d482
-
SHA256
55e2b5eb5fa34bb50e9c978eb874fc708bf0178477939532aca85faa8550cd4c
-
SHA512
b8a59948360402a55761ded9d9a372874c81247e50f29cefc4fc9f8f2bdfc647c5704788402e4f474b697bfb8d1405fa6e08902e6a7d10c501815ca7a6a792b4
-
SSDEEP
192:bUI7vgqzyx7/iEUzwASWvX9ubjV99I2NY74KXdXvPondIlGqg1EI/:QIbdyx7/CwdWw+2NYcKXdXvPSKQJ
Score
6/10
Malware Config
Signatures
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2024 30b2d9c3ba898b1f79d9128c18b0a16e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2024 30b2d9c3ba898b1f79d9128c18b0a16e.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1144 2024 30b2d9c3ba898b1f79d9128c18b0a16e.exe 8
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\30b2d9c3ba898b1f79d9128c18b0a16e.exe"C:\Users\Admin\AppData\Local\Temp\30b2d9c3ba898b1f79d9128c18b0a16e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024
-