Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 04:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b67b18b2fa7da2213e4cb53a13d4d974.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
b67b18b2fa7da2213e4cb53a13d4d974.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
b67b18b2fa7da2213e4cb53a13d4d974.exe
-
Size
20KB
-
MD5
b67b18b2fa7da2213e4cb53a13d4d974
-
SHA1
04fae36493603609de5d1d13cc7e6c0e3b7c3357
-
SHA256
8314c51979aef511bcc7280f1a55388a2e08d27f94bdbf382dd7a9e096830224
-
SHA512
51b6a30950c65017ba91f7a57d2bc6297e8e4527911a5453c3cdf09dd6180d0845d256c0cab5671f6cd164943ff1feca42f5ee78c6fad0024f37845d7824cd3a
-
SSDEEP
384:dD0G5wpN22BR0R89iYXA+V7OKSZvGr/3maGgBUCvUVFds0QzzoHWv:t5wpN2+0RSk+V7r0G/W1gBUwU/dYRv
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\config.dll b67b18b2fa7da2213e4cb53a13d4d974.exe File opened for modification C:\Windows\config.dll b67b18b2fa7da2213e4cb53a13d4d974.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4308 b67b18b2fa7da2213e4cb53a13d4d974.exe 4308 b67b18b2fa7da2213e4cb53a13d4d974.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4308 b67b18b2fa7da2213e4cb53a13d4d974.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4308 wrote to memory of 3436 4308 b67b18b2fa7da2213e4cb53a13d4d974.exe 57 PID 4308 wrote to memory of 3436 4308 b67b18b2fa7da2213e4cb53a13d4d974.exe 57
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\b67b18b2fa7da2213e4cb53a13d4d974.exe"C:\Users\Admin\AppData\Local\Temp\b67b18b2fa7da2213e4cb53a13d4d974.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4308
-