Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 16:18
Static task
static1
Behavioral task
behavioral1
Sample
8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe
Resource
win10v2004-20240709-en
General
-
Target
8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe
-
Size
885KB
-
MD5
30a907044cb1acc56526cec326d4e5d7
-
SHA1
e73c7ce3c3d762e20db44cbfc65698d02f586d0e
-
SHA256
8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001
-
SHA512
854fce4730070b1ea7a00661bf42ea6a1abe9cd24dfbe7231600e24aada4c06d7884010189460ff467843662cef9d199bb3aeae7c4e09277e25b487299ce5b10
-
SSDEEP
12288:TDrBYHWAJp3w+hi2LxUBTUoZ+KjO131aBJgEHR7PFNj2R0xmPzpcn/m7iiR/SWI/:6WAspBUokX1agQ7PD60m6/mTIJ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2564 set thread context of 2808 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2732 2808 WerFault.exe 32 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 2808 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2092 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 31 PID 2564 wrote to memory of 2092 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 31 PID 2564 wrote to memory of 2092 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 31 PID 2564 wrote to memory of 2092 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 31 PID 2564 wrote to memory of 2808 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 32 PID 2564 wrote to memory of 2808 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 32 PID 2564 wrote to memory of 2808 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 32 PID 2564 wrote to memory of 2808 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 32 PID 2564 wrote to memory of 2808 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 32 PID 2564 wrote to memory of 2808 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 32 PID 2564 wrote to memory of 2808 2564 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 32 PID 2808 wrote to memory of 2732 2808 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 33 PID 2808 wrote to memory of 2732 2808 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 33 PID 2808 wrote to memory of 2732 2808 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 33 PID 2808 wrote to memory of 2732 2808 8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe"C:\Users\Admin\AppData\Local\Temp\8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe"C:\Users\Admin\AppData\Local\Temp\8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe"2⤵PID:2092
-
-
C:\Users\Admin\AppData\Local\Temp\8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe"C:\Users\Admin\AppData\Local\Temp\8ccd8ad72f5b461d87f6363d193da86d5350d336bdaba12ab0f6ca861dc56001.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 363⤵
- Program crash
PID:2732
-
-