Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-03-2024 09:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c8518eded0779e65a8b09b4c0ff35f21.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
c8518eded0779e65a8b09b4c0ff35f21.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
c8518eded0779e65a8b09b4c0ff35f21.exe
-
Size
217KB
-
MD5
c8518eded0779e65a8b09b4c0ff35f21
-
SHA1
96a8f75aa8dde1ec7b398c78973b4a1c90fd3c58
-
SHA256
4769d8b513e7bdea0a1b93863da24e89cc5dffa1864ad2c34a4f87976f0e203c
-
SHA512
47d64b10e7d5c974e5441ac6e00480720e0f3f6a181165464c8c6a9ca57be25af8f6def85e5b070e748ecdf9af0311c8f026391531b40de4d9af32807308cc35
-
SSDEEP
3072:TAuiq7KEgtW+yClLsH8AWauWZv3ID+BFo3Nj/r6f4e8RN6hSklVYqxFV9GqpYuo2:z7KFE+VVg5RcNLmhlVZ6qpYuoCwROr
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2844 set thread context of 2648 2844 c8518eded0779e65a8b09b4c0ff35f21.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2648 c8518eded0779e65a8b09b4c0ff35f21.exe 2648 c8518eded0779e65a8b09b4c0ff35f21.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2844 c8518eded0779e65a8b09b4c0ff35f21.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2648 2844 c8518eded0779e65a8b09b4c0ff35f21.exe 28 PID 2844 wrote to memory of 2648 2844 c8518eded0779e65a8b09b4c0ff35f21.exe 28 PID 2844 wrote to memory of 2648 2844 c8518eded0779e65a8b09b4c0ff35f21.exe 28 PID 2844 wrote to memory of 2648 2844 c8518eded0779e65a8b09b4c0ff35f21.exe 28 PID 2844 wrote to memory of 2648 2844 c8518eded0779e65a8b09b4c0ff35f21.exe 28 PID 2844 wrote to memory of 2648 2844 c8518eded0779e65a8b09b4c0ff35f21.exe 28 PID 2844 wrote to memory of 2648 2844 c8518eded0779e65a8b09b4c0ff35f21.exe 28 PID 2844 wrote to memory of 2648 2844 c8518eded0779e65a8b09b4c0ff35f21.exe 28 PID 2648 wrote to memory of 1228 2648 c8518eded0779e65a8b09b4c0ff35f21.exe 21 PID 2648 wrote to memory of 1228 2648 c8518eded0779e65a8b09b4c0ff35f21.exe 21 PID 2648 wrote to memory of 1228 2648 c8518eded0779e65a8b09b4c0ff35f21.exe 21 PID 2648 wrote to memory of 1228 2648 c8518eded0779e65a8b09b4c0ff35f21.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\c8518eded0779e65a8b09b4c0ff35f21.exe"C:\Users\Admin\AppData\Local\Temp\c8518eded0779e65a8b09b4c0ff35f21.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\c8518eded0779e65a8b09b4c0ff35f21.exe"C:\Users\Admin\AppData\Local\Temp\c8518eded0779e65a8b09b4c0ff35f21.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2648
-
-