Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-06-2024 10:16
Static task
static1
Behavioral task
behavioral1
Sample
87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe
Resource
win10v2004-20240508-en
General
-
Target
87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe
-
Size
8.9MB
-
MD5
1b710b867316cc9ab04051ab6171d5ea
-
SHA1
2d1ba70682910401c0e3416976d1bd1ae76fea33
-
SHA256
87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9
-
SHA512
7a5076ac64b546780bec9d6c397a747db3a053b47a2f4fff062c203a2c13833917fd294f1c42a113d5705ac1a28ee129c3b8cea5ba142969ce3284f85857ae0a
-
SSDEEP
196608:BciTpIdkGGHWzFLz2WjPT+tnh249hEMjFhbm74l7LzoMyqE:BRk5VYWLT7hMnmCoMT
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2972 87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe"C:\Users\Admin\AppData\Local\Temp\87f6713235f57cc061866f417a3435c5af36fe78d53cff1da1793b6bb91d4bf9.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972