Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe
Resource
win10v2004-20240508-en
General
-
Target
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe
-
Size
12KB
-
MD5
73a82f11b119b3b68161c385d3b21ce1
-
SHA1
3022ea9d1fb93fba84ae31bfcd843c48baaa89a2
-
SHA256
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115
-
SHA512
fa2f67642930dc534360d0c5ab8294d7bfef22dd9332e72d74017130c0cb26ae25b5b0dd528d9d545e440ddaa4a9f61392d13189168978a10394aaadbe20a2cb
-
SSDEEP
192:RFBkm/S1R0XLQeFwUxifpoVGxcMR8DdkTYfJMULz9MQ1d:NB/HblJ0+Vq3uaoyA9M
Malware Config
Signatures
-
Suspicious behavior: RenamesItself 1 IoCs
Processes:
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exepid process 1768 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exedescription pid process Token: SeDebugPrivilege 1768 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe Token: SeDebugPrivilege 2112 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exedescription pid process target process PID 1768 wrote to memory of 2112 1768 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe PID 1768 wrote to memory of 2112 1768 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe PID 1768 wrote to memory of 2112 1768 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe PID 1768 wrote to memory of 2112 1768 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe 116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe"C:\Users\Admin\AppData\Local\Temp\116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\ProgramData\pcdfdata\116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exeC:\ProgramData\pcdfdata\116a8e65db201fd329ac14402254202e47314e0f310788948368e75dc9580115.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2112