Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 16:31
Behavioral task
behavioral1
Sample
Exm_Premium_Tweaking_Utility_V2.exe
Resource
win7-20240221-en
General
-
Target
Exm_Premium_Tweaking_Utility_V2.exe
-
Size
16.0MB
-
MD5
81da6189145c24816d35bf038845e753
-
SHA1
741dc8f77ff22f23450ab362054889828dfdbf3a
-
SHA256
c0308e2ea71ff40ce878556504ed644435ec61502bd5d01941ed632ccec029f9
-
SHA512
1dce39462761bff379360e3a80938bba27c7c429481fa476f54623f836f284f03dd692a4f846116ec27f4aaa5776698fb757affbd3d28e0befee3f6be1f8bf11
-
SSDEEP
393216:bEkZgf8iSNPG7NmiZoW1+TtIiFGuvB5IjWqn6eCz1kypRXiWCoaa:bRbioKEAl1QtIZS3ILn6ehyaVoaa
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2388 Exm_Premium_Tweaking_Utility_V2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1324 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1324 7zFM.exe Token: 35 1324 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1324 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2388 1704 Exm_Premium_Tweaking_Utility_V2.exe 28 PID 1704 wrote to memory of 2388 1704 Exm_Premium_Tweaking_Utility_V2.exe 28 PID 1704 wrote to memory of 2388 1704 Exm_Premium_Tweaking_Utility_V2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\Exm_Premium_Tweaking_Utility_V2.exe"C:\Users\Admin\AppData\Local\Temp\Exm_Premium_Tweaking_Utility_V2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Exm_Premium_Tweaking_Utility_V2.exe"C:\Users\Admin\AppData\Local\Temp\Exm_Premium_Tweaking_Utility_V2.exe"2⤵
- Loads dropped DLL
PID:2388
-
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\StopClose.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1324
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD5550288a078dffc3430c08da888e70810
SHA101b1d31f37fb3fd81d893cc5e4a258e976f5884f
SHA256789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d
SHA5127244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723