Resubmissions
13-09-2024 09:50
240913-lt52vawgrl 1013-09-2024 09:49
240913-ltjtlsxckd 1013-09-2024 09:48
240913-ls2b9swgmp 10Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 09:49
Behavioral task
behavioral1
Sample
583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d.exe
Resource
win11-20240802-en
General
-
Target
583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d.exe
-
Size
151KB
-
MD5
f635582929e0b0f2f18e1ee1fb7a84e9
-
SHA1
1d4946ea77a2bcf432f490d0a38429102a51069b
-
SHA256
583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d
-
SHA512
0a4ac0362ebf4ce81fb187d93898e3ffdf74e6a0da96913818ebbb59a236a3897ec680cdc4599a9cf8cee8f8b7d527c4fc0abf89016bab48449995d10065d1e7
-
SSDEEP
3072:mQHKadVFHUg2HiFI9ifi5iLLbyq8QL+wI7BJlwEKctby:BqSF/2HQlLLbyq8QL+wI7BJiEK
Malware Config
Extracted
xehook
2.1.5 Stable
https://t.me/+w897k5UK_jIyNDgy
-
id
208
-
token
xehook208262680500151
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2972 583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1900 2972 583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d.exe 29 PID 2972 wrote to memory of 1900 2972 583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d.exe 29 PID 2972 wrote to memory of 1900 2972 583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d.exe"C:\Users\Admin\AppData\Local\Temp\583c1eb6360379032d7cf7e6a60e09cfe74c7ecd36174016f293b060537fa52d.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2972 -s 10602⤵PID:1900
-