Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe
Resource
win10v2004-20240508-en
General
-
Target
060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe
-
Size
762KB
-
MD5
0f49bb0c2a604fa78ec0bd36b0a7f364
-
SHA1
5753b5b6e57c521670d901f441f8e2c65292542e
-
SHA256
060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83
-
SHA512
0e4e689afdd64e160293ad7d3e26871e20bb53b65e5c3276ba52b325ea9e616019bfda1e0c9fa6342beeb4fe6896ff4b44be4ca8a2c26acc7ca7b0bb2fc95180
-
SSDEEP
12288:M3qyJMrv295xzbgiPZ1xRllixBcyFDBdH7X+yz3dP7r9r/+ppppppppppppppppF:M6OmvzAUDBt7XvLd1q
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2288 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 28 PID 2368 wrote to memory of 2288 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 28 PID 2368 wrote to memory of 2288 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 28 PID 2368 wrote to memory of 2288 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 28 PID 2368 wrote to memory of 1620 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 29 PID 2368 wrote to memory of 1620 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 29 PID 2368 wrote to memory of 1620 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 29 PID 2368 wrote to memory of 1620 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 29 PID 2368 wrote to memory of 2704 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 30 PID 2368 wrote to memory of 2704 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 30 PID 2368 wrote to memory of 2704 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 30 PID 2368 wrote to memory of 2704 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 30 PID 2368 wrote to memory of 2708 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 31 PID 2368 wrote to memory of 2708 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 31 PID 2368 wrote to memory of 2708 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 31 PID 2368 wrote to memory of 2708 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 31 PID 2368 wrote to memory of 2736 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 32 PID 2368 wrote to memory of 2736 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 32 PID 2368 wrote to memory of 2736 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 32 PID 2368 wrote to memory of 2736 2368 060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe"C:\Users\Admin\AppData\Local\Temp\060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe"C:\Users\Admin\AppData\Local\Temp\060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe"2⤵PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe"C:\Users\Admin\AppData\Local\Temp\060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe"2⤵PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe"C:\Users\Admin\AppData\Local\Temp\060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe"2⤵PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe"C:\Users\Admin\AppData\Local\Temp\060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe"2⤵PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe"C:\Users\Admin\AppData\Local\Temp\060ad64d6e63aedbc2250c784d91852e3c2e113aca058565c8988d1930220a83.exe"2⤵PID:2736
-