Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe
Resource
win10v2004-20240508-en
General
-
Target
ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe
-
Size
2.7MB
-
MD5
f587289716b20ef3cf063401485a7739
-
SHA1
2d3d62e2897ef08191acad2e542cade10c5fe80a
-
SHA256
ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125
-
SHA512
39ebcbdc0e7df829d9b6661b75df85946a22b17ec66ab35f069be54f19b93979f5508dccf2f28d66a43951f5c24ac66eed0a7c50319243da08505a159539c036
-
SSDEEP
24576:Te021kbRDm43/F7XyNLeu5MjUpetNzO2wpg+J/5zNz/HCkjqgMo4+NXcFtFixj8d:Tj2q/ZK9MUpeX6t/bhj6SOixNG
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 37 IoCs
pid Process 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe Token: SeDebugPrivilege 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe Token: SeDebugPrivilege 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe Token: SeDebugPrivilege 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe 1520 ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe"C:\Users\Admin\AppData\Local\Temp\ab24aef3ac0ab48b8e9b774d471e7dd69baac86feddb450917d6590565002125.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1520