Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 12:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
97224caea74c8036d4597efb170a0013.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
97224caea74c8036d4597efb170a0013.exe
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
97224caea74c8036d4597efb170a0013.exe
-
Size
1.9MB
-
MD5
97224caea74c8036d4597efb170a0013
-
SHA1
b55e385c561a65509b49c1c52394443b65d7c791
-
SHA256
a9a16c8cc0135626137c4e3d1fce076429fe7167b30bf0313fb58812ad65d530
-
SHA512
d0025b5d144988275fce343ea48d0239d9b82fa4ba857d1f1d3a8bef23d48c82a50d78ad78e7d5a9d1f6595b02195f1d3ab47f7c1bdf752453f547db1c801366
-
SSDEEP
12288:p5274pKyhXzHkuoG+R6kNOS13IVAz7X/yEWUwkFKj5umynYV2rcD5/T9y0rqB79D:p13hm63S13ISv/vPFKIR6NrI7VV1Upq
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1132 97224caea74c8036d4597efb170a0013.exe 1132 97224caea74c8036d4597efb170a0013.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1132 97224caea74c8036d4597efb170a0013.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1132 wrote to memory of 4516 1132 97224caea74c8036d4597efb170a0013.exe 85 PID 1132 wrote to memory of 4516 1132 97224caea74c8036d4597efb170a0013.exe 85 PID 1132 wrote to memory of 4516 1132 97224caea74c8036d4597efb170a0013.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\97224caea74c8036d4597efb170a0013.exe"C:\Users\Admin\AppData\Local\Temp\97224caea74c8036d4597efb170a0013.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del /Q C:\Windows\system32\*.ime2⤵PID:4516
-