Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 14:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
c8db168047f324aaa56cdf9b390800d9.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
c8db168047f324aaa56cdf9b390800d9.exe
Resource
win10v2004-20240226-en
6 signatures
150 seconds
General
-
Target
c8db168047f324aaa56cdf9b390800d9.exe
-
Size
518KB
-
MD5
c8db168047f324aaa56cdf9b390800d9
-
SHA1
f14be251f2c803eee2b18e226696dfea62620993
-
SHA256
799a49aec382bdd086fac4ddb52324732dd85e4dc6bf018512ae5f87d8db5ed5
-
SHA512
a971789e055cdb1283142e9590d3a44590299ff34368834725c5f94b78b26cfa7a66eb2d7a9aa7fb5ee40617dfdb5c62e40947126a3ea229cbb250e2d6ab9ead
-
SSDEEP
12288:tgeUp73VH0pe8IrctsLgi6dAGMvlMPtziGivHOXnL:5Up7FV80ctVAGMvlqzFiWX
Score
1/10
Malware Config
Signatures
-
Kills process with taskkill 1 IoCs
pid Process 2556 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main c8db168047f324aaa56cdf9b390800d9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2556 taskkill.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 832 c8db168047f324aaa56cdf9b390800d9.exe 832 c8db168047f324aaa56cdf9b390800d9.exe 832 c8db168047f324aaa56cdf9b390800d9.exe 832 c8db168047f324aaa56cdf9b390800d9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 832 wrote to memory of 2556 832 c8db168047f324aaa56cdf9b390800d9.exe 28 PID 832 wrote to memory of 2556 832 c8db168047f324aaa56cdf9b390800d9.exe 28 PID 832 wrote to memory of 2556 832 c8db168047f324aaa56cdf9b390800d9.exe 28 PID 832 wrote to memory of 2556 832 c8db168047f324aaa56cdf9b390800d9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8db168047f324aaa56cdf9b390800d9.exe"C:\Users\Admin\AppData\Local\Temp\c8db168047f324aaa56cdf9b390800d9.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im DNF.exe.manifest2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2556
-