Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 00:38
Static task
static1
Behavioral task
behavioral1
Sample
Evon_646689.exe
Resource
win7-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Evon_646689.exe
Resource
win10v2004-20240426-en
7 signatures
150 seconds
General
-
Target
Evon_646689.exe
-
Size
22.6MB
-
MD5
08ea1813d6b205c446e6ae655c4e6715
-
SHA1
76f4d2af1c04ec157fc8a270da5980ee6bcb5def
-
SHA256
12288224d26607b30d026a32faf2ac7b49fc32acc8950eeaf60b933f2e39f48f
-
SHA512
a900bd2c4f33dc915fa27911620fafad76139da7c3d58ce3f40b7c2a1dcb11e893dc5b0cde7a74f93d6f1f5dc2ff949141b20f9c7d09a8bc3b9517f861c361e1
-
SSDEEP
393216:m8bMktzgHgxUv/1n6b121UnyuecRZndSk9bGWqCgu5op+wiCYCr2sfqisfU:m8bMkM1n6b121UnyuLEkTqA5a+Nc2sf6
Score
4/10
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3048 Evon_646689.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3048 Evon_646689.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 Evon_646689.exe