Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16-02-2024 12:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a058405d1e54704810b93f01742063bc.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
a058405d1e54704810b93f01742063bc.exe
-
Size
6.0MB
-
MD5
a058405d1e54704810b93f01742063bc
-
SHA1
dc9bcb107e6031b7e0f940d559e7e15e5e603517
-
SHA256
59cfae756c39c85f53ad789d87b95e93e7839fb182f2c598c9d75a04a4c0dd62
-
SHA512
71dd4c17baf009d6e696428c320cc0244cb953f42b00decc5f8a7972a61cfe2b3a7c6ebd57543a5a705668e5431697084963ed384bb59b1c1d09484c43c75f81
-
SSDEEP
98304:m20vX70nfFXtejsaxfBM8JStpRvVnjt6fqSp8vE39svDK5ExEA2:paX7u3ejsaVCY0pR9nj0fucsmXA2
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a058405d1e54704810b93f01742063bc.exedescription pid Process procid_target PID 3952 set thread context of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a058405d1e54704810b93f01742063bc.exepid Process 4872 a058405d1e54704810b93f01742063bc.exe 4872 a058405d1e54704810b93f01742063bc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a058405d1e54704810b93f01742063bc.exedescription pid Process Token: SeTakeOwnershipPrivilege 4872 a058405d1e54704810b93f01742063bc.exe Token: SeTcbPrivilege 4872 a058405d1e54704810b93f01742063bc.exe Token: SeTcbPrivilege 4872 a058405d1e54704810b93f01742063bc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a058405d1e54704810b93f01742063bc.exea058405d1e54704810b93f01742063bc.exepid Process 3952 a058405d1e54704810b93f01742063bc.exe 4872 a058405d1e54704810b93f01742063bc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
a058405d1e54704810b93f01742063bc.exedescription pid Process procid_target PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82 PID 3952 wrote to memory of 4872 3952 a058405d1e54704810b93f01742063bc.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\a058405d1e54704810b93f01742063bc.exe"C:\Users\Admin\AppData\Local\Temp\a058405d1e54704810b93f01742063bc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\a058405d1e54704810b93f01742063bc.exe"C:\Users\Admin\AppData\Local\Temp\a058405d1e54704810b93f01742063bc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4872
-