Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15-02-2024 17:38
Behavioral task
behavioral1
Sample
9e290aa26b783d5c04c05287134ee8b8.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
9e290aa26b783d5c04c05287134ee8b8.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
9e290aa26b783d5c04c05287134ee8b8.exe
-
Size
214KB
-
MD5
9e290aa26b783d5c04c05287134ee8b8
-
SHA1
cf0831c28ddead0833740faee979231df902a150
-
SHA256
28e73c03fa9664b63c4d98c4867877542292ed8a528b5065fc9f27fa8d7cb1c3
-
SHA512
863add75dceaeb819ac10d4ab380fabe76f670c5e71535ca8a2f87661e99f284e7cbdf9e641494232b4e27faec1bc358ba58248b3f55e4008ee92d38c1aeae40
-
SSDEEP
6144:e14tUHf3gG+pcExJMHVLmpwU4te5ZyYvN1vj:HUfg5UOP4teXyIvj
Score
7/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4200-0-0x0000000000400000-0x00000000004AD000-memory.dmp upx behavioral2/memory/4200-5-0x0000000000400000-0x00000000004AD000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9e290aa26b783d5c04c05287134ee8b8.exedescription pid process target process PID 4200 set thread context of 4804 4200 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
9e290aa26b783d5c04c05287134ee8b8.exepid process 4804 9e290aa26b783d5c04c05287134ee8b8.exe 4804 9e290aa26b783d5c04c05287134ee8b8.exe 4804 9e290aa26b783d5c04c05287134ee8b8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9e290aa26b783d5c04c05287134ee8b8.exedescription pid process Token: SeDebugPrivilege 4804 9e290aa26b783d5c04c05287134ee8b8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9e290aa26b783d5c04c05287134ee8b8.exepid process 4200 9e290aa26b783d5c04c05287134ee8b8.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9e290aa26b783d5c04c05287134ee8b8.exedescription pid process target process PID 4200 wrote to memory of 4804 4200 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 4200 wrote to memory of 4804 4200 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 4200 wrote to memory of 4804 4200 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 4200 wrote to memory of 4804 4200 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 4200 wrote to memory of 4804 4200 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 4200 wrote to memory of 4804 4200 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 4200 wrote to memory of 4804 4200 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 4200 wrote to memory of 4804 4200 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe PID 4200 wrote to memory of 4804 4200 9e290aa26b783d5c04c05287134ee8b8.exe 9e290aa26b783d5c04c05287134ee8b8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e290aa26b783d5c04c05287134ee8b8.exe"C:\Users\Admin\AppData\Local\Temp\9e290aa26b783d5c04c05287134ee8b8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\9e290aa26b783d5c04c05287134ee8b8.exe"C:\Users\Admin\AppData\Local\Temp\9e290aa26b783d5c04c05287134ee8b8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804