Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 07:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
52da752b66bcbfaf2dd6f3667443e0f9.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
52da752b66bcbfaf2dd6f3667443e0f9.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
52da752b66bcbfaf2dd6f3667443e0f9.exe
-
Size
709KB
-
MD5
52da752b66bcbfaf2dd6f3667443e0f9
-
SHA1
20bf9d103b5c7010b48aedf594707ad570882f97
-
SHA256
f2c30fdc607310f2fe85886c092791be1f7b4ba3308e2a93d0e12813de767b1b
-
SHA512
1a2acbc767fd2a2591f4960040dede944adbdb44aaf3a440b146ff6e51fbc616f748a76910e5ba21755d087d26aa96476097caa2dad0f85af1b66a6fd6d6b478
-
SSDEEP
12288:B4r8k4oi2q3qUVMIhinPZjCtcF3Z4mxxweYMiCTfXYsPviW8:ir8E6qBIWCiQmXwdMiCjHXP8
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4680 Hacker -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker 52da752b66bcbfaf2dd6f3667443e0f9.exe File opened for modification C:\Windows\Hacker 52da752b66bcbfaf2dd6f3667443e0f9.exe File created C:\Windows\uninstal.bat 52da752b66bcbfaf2dd6f3667443e0f9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1060 52da752b66bcbfaf2dd6f3667443e0f9.exe Token: SeDebugPrivilege 4680 Hacker -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4680 Hacker -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4680 wrote to memory of 4972 4680 Hacker 92 PID 4680 wrote to memory of 4972 4680 Hacker 92 PID 1060 wrote to memory of 3136 1060 52da752b66bcbfaf2dd6f3667443e0f9.exe 93 PID 1060 wrote to memory of 3136 1060 52da752b66bcbfaf2dd6f3667443e0f9.exe 93 PID 1060 wrote to memory of 3136 1060 52da752b66bcbfaf2dd6f3667443e0f9.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\52da752b66bcbfaf2dd6f3667443e0f9.exe"C:\Users\Admin\AppData\Local\Temp\52da752b66bcbfaf2dd6f3667443e0f9.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat2⤵PID:3136
-
-
C:\Windows\HackerC:\Windows\Hacker1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:4972
-