Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 05:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3681321143840CM.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
30 seconds
Behavioral task
behavioral2
Sample
3681321143840CM.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
10 signatures
30 seconds
General
-
Target
3681321143840CM.exe
-
Size
667KB
-
MD5
0f10988a5146ac132e1bbc875b3cd3dd
-
SHA1
a89fe9be43139dd986305da3876229ba2cbfb7bd
-
SHA256
e4edb4a6d5718591e0fa02d78f3af9fe5cea87ed7f0e792fddc7022c6b5460c6
-
SHA512
4282ff8b128270e68785514c5211bdf1aa8c7727c55d1aa5197e0635edbabf6c58fab6379f60d372bfef8f580de043b9e00803070d8dc48f0f9669479a697535
-
SSDEEP
12288:BaIzwcGHWnqefhLXgeNyzd5PaAd6pk2nSLTTEj/2r6890DAkv2du:HzLxfhrgeNyZo3pLS34j06890DFOdu
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
3681321143840CM.exepid process 2192 3681321143840CM.exe 2192 3681321143840CM.exe 2192 3681321143840CM.exe 2192 3681321143840CM.exe 2192 3681321143840CM.exe 2192 3681321143840CM.exe 2192 3681321143840CM.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3681321143840CM.exedescription pid process Token: SeDebugPrivilege 2192 3681321143840CM.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
3681321143840CM.exedescription pid process target process PID 2192 wrote to memory of 2552 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2552 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2552 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2552 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2540 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2540 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2540 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2540 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2592 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2592 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2592 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2592 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2608 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2608 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2608 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2608 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2612 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2612 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2612 2192 3681321143840CM.exe 3681321143840CM.exe PID 2192 wrote to memory of 2612 2192 3681321143840CM.exe 3681321143840CM.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3681321143840CM.exe"C:\Users\Admin\AppData\Local\Temp\3681321143840CM.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\3681321143840CM.exe"C:\Users\Admin\AppData\Local\Temp\3681321143840CM.exe"2⤵PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\3681321143840CM.exe"C:\Users\Admin\AppData\Local\Temp\3681321143840CM.exe"2⤵PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\3681321143840CM.exe"C:\Users\Admin\AppData\Local\Temp\3681321143840CM.exe"2⤵PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\3681321143840CM.exe"C:\Users\Admin\AppData\Local\Temp\3681321143840CM.exe"2⤵PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\3681321143840CM.exe"C:\Users\Admin\AppData\Local\Temp\3681321143840CM.exe"2⤵PID:2612
-