Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-03-2024 17:44
Behavioral task
behavioral1
Sample
0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe
-
Size
59KB
-
MD5
4a8dcedf91e72b2dc33c2ed814dd1543
-
SHA1
d210fb62ae84ef45ccd373f93b9a8d3cbde9244f
-
SHA256
0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab
-
SHA512
f5237feff1219f0ba64c4cedd26afa65be6714d75a54640a9ea9b43aa2b480d737967ba2acf531c132c3e88faaf48ed2921be00c7b9adfb1200f5328799100d8
-
SSDEEP
1536:n74eTm75dK96w6F8/7JAYoBw0YbG28OzXfXBzkU:74eq1k0wk8/75h0YSBOzp1
Score
9/10
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 3 IoCs
resource yara_rule behavioral1/memory/2492-0-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2492-2660-0x000000000EA00000-0x000000000EA27000-memory.dmp UPX behavioral1/memory/2492-2661-0x0000000000400000-0x0000000000427000-memory.dmp UPX -
resource yara_rule behavioral1/memory/2492-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1176-4-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-7-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-34-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-46-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-61-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-64-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-58-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-55-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-52-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-49-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-43-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-40-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-37-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-31-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-28-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-25-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-22-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-19-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-16-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-13-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/1176-10-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/2492-2660-0x000000000EA00000-0x000000000EA27000-memory.dmp upx behavioral1/memory/2492-2661-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe Token: SeDebugPrivilege 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 1176 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 21 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3 PID 2492 wrote to memory of 388 2492 0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe 3
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:388
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:608
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1612
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:692
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:764
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:832
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1096
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:880
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:988
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:296
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:1080
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1088
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1156
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:1640
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2960
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:488
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:500
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:436
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe"C:\Users\Admin\AppData\Local\Temp\0286df3213edbeb4f272aff87d792751407ba7b07944b774ad5a10810127a8ab.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492
-