Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/03/2024, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
DBS.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
DBS.exe
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
DBS.exe
-
Size
665KB
-
MD5
80660dd1ab6a91514c1562e7e10abfa4
-
SHA1
100caee8a4c5805f32af8494833f14ecdbe300ec
-
SHA256
5238f604ab1916bdcf6e10422ce36b10edf864182949193d8c9555d086310e18
-
SHA512
c5316d3eeb55721a3fa21a051caad2d810aff384aed01cf2597d36cba7aef0ad9634857a5fbfe8c2711e071e74849afe04abe6624558313b029be766c787fafd
-
SSDEEP
12288:QUFtImAFeXg5ux/t6nTrVlMrRtBJwIaTqUB1oJ1mqxLay1d/v5zH37ykR:j61FeXgWlGNWrRtBJQBCJ0MX1dJzH39
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2440 powershell.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe 2232 DBS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2232 DBS.exe Token: SeDebugPrivilege 2440 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2440 2232 DBS.exe 30 PID 2232 wrote to memory of 2440 2232 DBS.exe 30 PID 2232 wrote to memory of 2440 2232 DBS.exe 30 PID 2232 wrote to memory of 2440 2232 DBS.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\DBS.exe"C:\Users\Admin\AppData\Local\Temp\DBS.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\DBS.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440
-