Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 09:27
Behavioral task
behavioral1
Sample
7cc32d01f2aa582fdeb4236cdcf6e5b0.exe
Resource
win7-20231215-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
7cc32d01f2aa582fdeb4236cdcf6e5b0.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
7cc32d01f2aa582fdeb4236cdcf6e5b0.exe
-
Size
73KB
-
MD5
7cc32d01f2aa582fdeb4236cdcf6e5b0
-
SHA1
b460bfac0b50a9d1d1948a32760522c126305ea5
-
SHA256
96fc8c609c261a6f66c4a0a1320c26f482c6eb4536472f6b1684f4df8cfdbf09
-
SHA512
893ffe76e733fcc5a9d496ec43845e2685e4fe8211eed8ab699989dc9c1c8ca4f084865112fa67616c1662390301ac2d5b1b4b410b95a4c74f6d76f099641d21
-
SSDEEP
1536:YdGg858Du4LaXCGgsc0B1r+C+Uhzcg7NE:ui8Dp+SGZdltvhzVhE
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2780-0-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2780-7-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2780-9-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification \??\c:\Program Files\dialers\goin.exe 7cc32d01f2aa582fdeb4236cdcf6e5b0.exe File created \??\c:\Program Files\dialers\goin.exe 7cc32d01f2aa582fdeb4236cdcf6e5b0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2780 7cc32d01f2aa582fdeb4236cdcf6e5b0.exe