Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 01:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
putty.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
putty.exe
Resource
win10v2004-20240508-en
8 signatures
150 seconds
General
-
Target
putty.exe
-
Size
1.2MB
-
MD5
5e57b71daab3da3fbc7aaeff9a39437c
-
SHA1
6439c06796865c857cb09aeb724907a1c0b049df
-
SHA256
cf57eea613905dc9db75988cc6579528f16c62d4f9e69e2c58881e08bd492af3
-
SHA512
4135971fec1e880c8ea82af75b6de98e3d83e1bb89f31c5c643eb864c5ee00a81076ce694d4eb0dae2f9595f8f74fa962f1149eb38bfd0a4fae4fb390b9816e8
-
SSDEEP
24576:G9M9KGzpGQZA5x+Hxps7rg3fJtjCO6zUB1IJ9Zut5ivSLO/yqXxv/F8:G9M9Kms703fJtjCO6zUB1IJit5iqeyS
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2560 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2412 putty.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2560 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 putty.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2560 2824 cmd.exe 32 PID 2824 wrote to memory of 2560 2824 cmd.exe 32 PID 2824 wrote to memory of 2560 2824 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\putty.exe"C:\Users\Admin\AppData\Local\Temp\putty.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2412
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-