Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
16-02-2024 12:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a058405d1e54704810b93f01742063bc.exe
Resource
win7-20231215-en
6 signatures
150 seconds
General
-
Target
a058405d1e54704810b93f01742063bc.exe
-
Size
6.0MB
-
MD5
a058405d1e54704810b93f01742063bc
-
SHA1
dc9bcb107e6031b7e0f940d559e7e15e5e603517
-
SHA256
59cfae756c39c85f53ad789d87b95e93e7839fb182f2c598c9d75a04a4c0dd62
-
SHA512
71dd4c17baf009d6e696428c320cc0244cb953f42b00decc5f8a7972a61cfe2b3a7c6ebd57543a5a705668e5431697084963ed384bb59b1c1d09484c43c75f81
-
SSDEEP
98304:m20vX70nfFXtejsaxfBM8JStpRvVnjt6fqSp8vE39svDK5ExEA2:paX7u3ejsaVCY0pR9nj0fucsmXA2
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 108 set thread context of 320 108 a058405d1e54704810b93f01742063bc.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 320 a058405d1e54704810b93f01742063bc.exe 320 a058405d1e54704810b93f01742063bc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 320 a058405d1e54704810b93f01742063bc.exe Token: SeTcbPrivilege 320 a058405d1e54704810b93f01742063bc.exe Token: SeTcbPrivilege 320 a058405d1e54704810b93f01742063bc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 108 a058405d1e54704810b93f01742063bc.exe 320 a058405d1e54704810b93f01742063bc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28 PID 108 wrote to memory of 320 108 a058405d1e54704810b93f01742063bc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a058405d1e54704810b93f01742063bc.exe"C:\Users\Admin\AppData\Local\Temp\a058405d1e54704810b93f01742063bc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Users\Admin\AppData\Local\Temp\a058405d1e54704810b93f01742063bc.exe"C:\Users\Admin\AppData\Local\Temp\a058405d1e54704810b93f01742063bc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:320
-