Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe
Resource
win10v2004-20240508-en
General
-
Target
89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe
-
Size
9.3MB
-
MD5
0958d8ee14e1616a758f67147d416d9d
-
SHA1
d4b0bcde8162c8beb94a9972f2a6be1d4c004c36
-
SHA256
89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d
-
SHA512
bb0055b72c67b0ec5a88f547149badd862301a68121040bf3c096f2075b788acf96bde19d6970c0fb8ad218e32afaf8b14213f62d705df349de31d5822ea08f4
-
SSDEEP
196608:OfQPp6th6U2TdPE0s9akhY1i74qiK7l7BAE1QBaumTxUc8YVd40:OoRnyn9NF74qTbl1Qm9KYL
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2716 89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2716 89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2716 89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe Token: SeShutdownPrivilege 2716 89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe Token: SeLoadDriverPrivilege 2716 89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe Token: SeTakeOwnershipPrivilege 2716 89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe Token: SeBackupPrivilege 2716 89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe Token: SeRestorePrivilege 2716 89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2716 89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe 2716 89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe"C:\Users\Admin\AppData\Local\Temp\89dc1376dc9e78f760389a28b40075d4d593cf5508ff29634eb6b4b292aae74d.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2716