Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
251f527907a1835247d710a439395b22.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
251f527907a1835247d710a439395b22.exe
Resource
win10v2004-20231222-en
0 signatures
150 seconds
General
-
Target
251f527907a1835247d710a439395b22.exe
-
Size
42KB
-
MD5
251f527907a1835247d710a439395b22
-
SHA1
c89b82cb562480d402ab1953cab20e5538fed061
-
SHA256
77fe623ac74864a8af2d98395f7fbd99b45a9fe40a8a8bc421819dacb9ffbb75
-
SHA512
31745ad206a8595943205a861c72568d2af91073255532ca3ed0de826912e838c6721f36b8ef3ff663ca5dbf987f82a2985c6fb97ca281bbd0a439351134afef
-
SSDEEP
768:OT1e0WvanQ2zOXVioc8S+ZVR/f174evgcUc+4KYtjKgn3EEsUQERkFv69Q0ZCMIT:OT1emvzOXVO+Z//f+evzM4KGjrn3EEsT
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2932 desktop.exe -
Loads dropped DLL 2 IoCs
pid Process 2912 251f527907a1835247d710a439395b22.exe 2912 251f527907a1835247d710a439395b22.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\desktop.exe 251f527907a1835247d710a439395b22.exe File created C:\Windows\SysWOW64\desktop.dll desktop.exe File created C:\Windows\SysWOW64\desktop.exe 251f527907a1835247d710a439395b22.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2932 desktop.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2932 desktop.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2932 2912 251f527907a1835247d710a439395b22.exe 16 PID 2912 wrote to memory of 2932 2912 251f527907a1835247d710a439395b22.exe 16 PID 2912 wrote to memory of 2932 2912 251f527907a1835247d710a439395b22.exe 16 PID 2912 wrote to memory of 2932 2912 251f527907a1835247d710a439395b22.exe 16 PID 2932 wrote to memory of 492 2932 desktop.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\251f527907a1835247d710a439395b22.exe"C:\Users\Admin\AppData\Local\Temp\251f527907a1835247d710a439395b22.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\desktop.exeC:\Windows\system32\desktop.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:492