Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 00:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08da3ff65a9ab763f0fa01e6913f600b.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
08da3ff65a9ab763f0fa01e6913f600b.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
08da3ff65a9ab763f0fa01e6913f600b.exe
-
Size
20KB
-
MD5
08da3ff65a9ab763f0fa01e6913f600b
-
SHA1
efe6d7af3b928a330c0ce07cd92d46e0fd91ba70
-
SHA256
154ea453a39ca2d4abdf6cce620f7d3c941ac934c70cfc94416027ad6a5b9f2d
-
SHA512
219562620bd5ae7379f80cc18bf4068775accfc62f1b8843a97c0dd80cfc3c0e6b0575a97b5be061f4afb66abc69f19a8e008187a251b9feb5c4d2b6f43dc1af
-
SSDEEP
96:SrgAgC7SWHivvaCR0A7lkXrHGLw9ZDb2TXk2RtEzxsSVxKD9ShTSkMWF9Lc2:SrghzK/+GGL0uTXk8gXVkD9SokMWrc
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 4108 08da3ff65a9ab763f0fa01e6913f600b.exe Token: SeSystemtimePrivilege 4108 08da3ff65a9ab763f0fa01e6913f600b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4108 08da3ff65a9ab763f0fa01e6913f600b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4108 wrote to memory of 3996 4108 08da3ff65a9ab763f0fa01e6913f600b.exe 88 PID 4108 wrote to memory of 3996 4108 08da3ff65a9ab763f0fa01e6913f600b.exe 88 PID 4108 wrote to memory of 3996 4108 08da3ff65a9ab763f0fa01e6913f600b.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\08da3ff65a9ab763f0fa01e6913f600b.exe"C:\Users\Admin\AppData\Local\Temp\08da3ff65a9ab763f0fa01e6913f600b.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\cmd.execmd.exe /c date 2018-12-112⤵PID:3996
-