Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15-02-2024 17:38
Behavioral task
behavioral1
Sample
9e290aa26b783d5c04c05287134ee8b8.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
9e290aa26b783d5c04c05287134ee8b8.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
9e290aa26b783d5c04c05287134ee8b8.exe
-
Size
214KB
-
MD5
9e290aa26b783d5c04c05287134ee8b8
-
SHA1
cf0831c28ddead0833740faee979231df902a150
-
SHA256
28e73c03fa9664b63c4d98c4867877542292ed8a528b5065fc9f27fa8d7cb1c3
-
SHA512
863add75dceaeb819ac10d4ab380fabe76f670c5e71535ca8a2f87661e99f284e7cbdf9e641494232b4e27faec1bc358ba58248b3f55e4008ee92d38c1aeae40
-
SSDEEP
6144:e14tUHf3gG+pcExJMHVLmpwU4te5ZyYvN1vj:HUfg5UOP4teXyIvj
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2500-0-0x0000000000400000-0x00000000004AD000-memory.dmp upx behavioral1/memory/2500-3-0x0000000000560000-0x000000000060D000-memory.dmp upx behavioral1/memory/2500-6-0x0000000000400000-0x00000000004AD000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9e290aa26b783d5c04c05287134ee8b8.exedescription pid process target process PID 2500 set thread context of 2428 2500 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9e290aa26b783d5c04c05287134ee8b8.exepid process 2428 9e290aa26b783d5c04c05287134ee8b8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9e290aa26b783d5c04c05287134ee8b8.exedescription pid process Token: SeDebugPrivilege 2428 9e290aa26b783d5c04c05287134ee8b8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9e290aa26b783d5c04c05287134ee8b8.exepid process 2500 9e290aa26b783d5c04c05287134ee8b8.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
9e290aa26b783d5c04c05287134ee8b8.exedescription pid process target process PID 2500 wrote to memory of 2428 2500 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 2500 wrote to memory of 2428 2500 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 2500 wrote to memory of 2428 2500 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 2500 wrote to memory of 2428 2500 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 2500 wrote to memory of 2428 2500 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 2500 wrote to memory of 2428 2500 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 2500 wrote to memory of 2428 2500 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 2500 wrote to memory of 2428 2500 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 2500 wrote to memory of 2428 2500 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 2500 wrote to memory of 2428 2500 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e290aa26b783d5c04c05287134ee8b8.exe"C:\Users\Admin\AppData\Local\Temp\9e290aa26b783d5c04c05287134ee8b8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\9e290aa26b783d5c04c05287134ee8b8.exe"C:\Users\Admin\AppData\Local\Temp\9e290aa26b783d5c04c05287134ee8b8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428