Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 15:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7d5f04601c30d697a6925cd57f536454.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
7d5f04601c30d697a6925cd57f536454.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
7d5f04601c30d697a6925cd57f536454.exe
-
Size
166KB
-
MD5
7d5f04601c30d697a6925cd57f536454
-
SHA1
a67e76027dff46f42f4b20ba931ddf9ba78f5829
-
SHA256
4a3615b5ab91a5a7e052c0b0c2a1c104a142444fd4d26d712817e993714df34f
-
SHA512
614fcbf32201ee588ba85f55c024345af2cec874b69b32f05f7c5f379b5c48da6bd9d3d4af6c60425e4812df3c5077d84f0637ff0896a9a9ad2ff763c50c0b97
-
SSDEEP
3072:7xUFD7b/y8nfoxW8u85PW0ot2Z93Pprz7el59RHdtyHrrLtPF:7AljuPySPpyl5rHdQjtd
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 2752 2028 7d5f04601c30d697a6925cd57f536454.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2752 7d5f04601c30d697a6925cd57f536454.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2752 7d5f04601c30d697a6925cd57f536454.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2752 2028 7d5f04601c30d697a6925cd57f536454.exe 28 PID 2028 wrote to memory of 2752 2028 7d5f04601c30d697a6925cd57f536454.exe 28 PID 2028 wrote to memory of 2752 2028 7d5f04601c30d697a6925cd57f536454.exe 28 PID 2028 wrote to memory of 2752 2028 7d5f04601c30d697a6925cd57f536454.exe 28 PID 2028 wrote to memory of 2752 2028 7d5f04601c30d697a6925cd57f536454.exe 28 PID 2028 wrote to memory of 2752 2028 7d5f04601c30d697a6925cd57f536454.exe 28 PID 2028 wrote to memory of 2752 2028 7d5f04601c30d697a6925cd57f536454.exe 28 PID 2028 wrote to memory of 2752 2028 7d5f04601c30d697a6925cd57f536454.exe 28 PID 2028 wrote to memory of 2752 2028 7d5f04601c30d697a6925cd57f536454.exe 28 PID 2028 wrote to memory of 2752 2028 7d5f04601c30d697a6925cd57f536454.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d5f04601c30d697a6925cd57f536454.exe"C:\Users\Admin\AppData\Local\Temp\7d5f04601c30d697a6925cd57f536454.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\7d5f04601c30d697a6925cd57f536454.exe"C:\Users\Admin\AppData\Local\Temp\7d5f04601c30d697a6925cd57f536454.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-