Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 16:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
75048b2cf840c20b06c3b36ccc77b7af.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
75048b2cf840c20b06c3b36ccc77b7af.exe
-
Size
139KB
-
MD5
75048b2cf840c20b06c3b36ccc77b7af
-
SHA1
a6b402cad583c3fb402ea205e6129a8ba905990b
-
SHA256
791831034a36bfa2213940dfd9ffc6cb9dc0660ecd1a6d8de3565260c9cec8d2
-
SHA512
ea029284f31fd44ed023b1fb3f7c0541943ae507914eeac6e4a1ed70ba063a9e4ac5adae92ed8db0c1d721653fcb58244ecd24d2d89865ae6ecb5893506ed50e
-
SSDEEP
3072:IV2MAwtwxC451FTDQ023yHav4gFGMHJeGrkW2gYmY:IMec7MyHaAgFGMHJeDW2g
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
75048b2cf840c20b06c3b36ccc77b7af.exepid process 3016 75048b2cf840c20b06c3b36ccc77b7af.exe -
Suspicious behavior: MapViewOfSection 21 IoCs
Processes:
75048b2cf840c20b06c3b36ccc77b7af.exepid process 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe 3016 75048b2cf840c20b06c3b36ccc77b7af.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
75048b2cf840c20b06c3b36ccc77b7af.exedescription pid process Token: SeDebugPrivilege 3016 75048b2cf840c20b06c3b36ccc77b7af.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
75048b2cf840c20b06c3b36ccc77b7af.exedescription pid process target process PID 3016 wrote to memory of 372 3016 75048b2cf840c20b06c3b36ccc77b7af.exe wininit.exe PID 3016 wrote to memory of 372 3016 75048b2cf840c20b06c3b36ccc77b7af.exe wininit.exe PID 3016 wrote to memory of 372 3016 75048b2cf840c20b06c3b36ccc77b7af.exe wininit.exe PID 3016 wrote to memory of 372 3016 75048b2cf840c20b06c3b36ccc77b7af.exe wininit.exe PID 3016 wrote to memory of 372 3016 75048b2cf840c20b06c3b36ccc77b7af.exe wininit.exe PID 3016 wrote to memory of 372 3016 75048b2cf840c20b06c3b36ccc77b7af.exe wininit.exe PID 3016 wrote to memory of 372 3016 75048b2cf840c20b06c3b36ccc77b7af.exe wininit.exe PID 3016 wrote to memory of 384 3016 75048b2cf840c20b06c3b36ccc77b7af.exe csrss.exe PID 3016 wrote to memory of 384 3016 75048b2cf840c20b06c3b36ccc77b7af.exe csrss.exe PID 3016 wrote to memory of 384 3016 75048b2cf840c20b06c3b36ccc77b7af.exe csrss.exe PID 3016 wrote to memory of 384 3016 75048b2cf840c20b06c3b36ccc77b7af.exe csrss.exe PID 3016 wrote to memory of 384 3016 75048b2cf840c20b06c3b36ccc77b7af.exe csrss.exe PID 3016 wrote to memory of 384 3016 75048b2cf840c20b06c3b36ccc77b7af.exe csrss.exe PID 3016 wrote to memory of 384 3016 75048b2cf840c20b06c3b36ccc77b7af.exe csrss.exe PID 3016 wrote to memory of 420 3016 75048b2cf840c20b06c3b36ccc77b7af.exe winlogon.exe PID 3016 wrote to memory of 420 3016 75048b2cf840c20b06c3b36ccc77b7af.exe winlogon.exe PID 3016 wrote to memory of 420 3016 75048b2cf840c20b06c3b36ccc77b7af.exe winlogon.exe PID 3016 wrote to memory of 420 3016 75048b2cf840c20b06c3b36ccc77b7af.exe winlogon.exe PID 3016 wrote to memory of 420 3016 75048b2cf840c20b06c3b36ccc77b7af.exe winlogon.exe PID 3016 wrote to memory of 420 3016 75048b2cf840c20b06c3b36ccc77b7af.exe winlogon.exe PID 3016 wrote to memory of 420 3016 75048b2cf840c20b06c3b36ccc77b7af.exe winlogon.exe PID 3016 wrote to memory of 464 3016 75048b2cf840c20b06c3b36ccc77b7af.exe services.exe PID 3016 wrote to memory of 464 3016 75048b2cf840c20b06c3b36ccc77b7af.exe services.exe PID 3016 wrote to memory of 464 3016 75048b2cf840c20b06c3b36ccc77b7af.exe services.exe PID 3016 wrote to memory of 464 3016 75048b2cf840c20b06c3b36ccc77b7af.exe services.exe PID 3016 wrote to memory of 464 3016 75048b2cf840c20b06c3b36ccc77b7af.exe services.exe PID 3016 wrote to memory of 464 3016 75048b2cf840c20b06c3b36ccc77b7af.exe services.exe PID 3016 wrote to memory of 464 3016 75048b2cf840c20b06c3b36ccc77b7af.exe services.exe PID 3016 wrote to memory of 476 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsass.exe PID 3016 wrote to memory of 476 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsass.exe PID 3016 wrote to memory of 476 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsass.exe PID 3016 wrote to memory of 476 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsass.exe PID 3016 wrote to memory of 476 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsass.exe PID 3016 wrote to memory of 476 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsass.exe PID 3016 wrote to memory of 476 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsass.exe PID 3016 wrote to memory of 484 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsm.exe PID 3016 wrote to memory of 484 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsm.exe PID 3016 wrote to memory of 484 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsm.exe PID 3016 wrote to memory of 484 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsm.exe PID 3016 wrote to memory of 484 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsm.exe PID 3016 wrote to memory of 484 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsm.exe PID 3016 wrote to memory of 484 3016 75048b2cf840c20b06c3b36ccc77b7af.exe lsm.exe PID 3016 wrote to memory of 596 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 596 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 596 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 596 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 596 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 596 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 596 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 672 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 672 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 672 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 672 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 672 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 672 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 672 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 756 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 756 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 756 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 756 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 756 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 756 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 756 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe PID 3016 wrote to memory of 800 3016 75048b2cf840c20b06c3b36ccc77b7af.exe svchost.exe
Processes
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:964
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1120
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1748
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:2388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1044
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:836
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:800
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:672
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:596
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:372
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:476
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:484
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2504
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\75048b2cf840c20b06c3b36ccc77b7af.exe"C:\Users\Admin\AppData\Local\Temp\75048b2cf840c20b06c3b36ccc77b7af.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1200