Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 06:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5fd523b7147afde2679a7fcf2fac2a07.exe
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
5fd523b7147afde2679a7fcf2fac2a07.exe
-
Size
959KB
-
MD5
5fd523b7147afde2679a7fcf2fac2a07
-
SHA1
b680d96592494011aa5c3fd322ad065baeaf5b28
-
SHA256
c4bb63c77cfca24c0e0c4ceb82c8186d1ba72ccd25eef8809e1419afcf466699
-
SHA512
f45fc81a8735ca80ba6a2c83e867baa7c5dc853cd69b164d8eb3a4737400576db655437749dd71b9b67ebf445ebc95e4d43f12566e8693fa04e4055f3317f91e
-
SSDEEP
24576:/Lse4BvEow8Z1LRMTYmT0vPkx1n3anW8rBMrT48UlPGv:IeKsowsYnB1nqnlMH48iGv
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
5fd523b7147afde2679a7fcf2fac2a07.exedescription pid process target process PID 4864 created 3468 4864 5fd523b7147afde2679a7fcf2fac2a07.exe Explorer.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5fd523b7147afde2679a7fcf2fac2a07.exedescription pid process target process PID 4864 set thread context of 4932 4864 5fd523b7147afde2679a7fcf2fac2a07.exe 5fd523b7147afde2679a7fcf2fac2a07.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5fd523b7147afde2679a7fcf2fac2a07.exepid process 4864 5fd523b7147afde2679a7fcf2fac2a07.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
5fd523b7147afde2679a7fcf2fac2a07.exe5fd523b7147afde2679a7fcf2fac2a07.exedescription pid process Token: SeDebugPrivilege 4864 5fd523b7147afde2679a7fcf2fac2a07.exe Token: SeDebugPrivilege 4864 5fd523b7147afde2679a7fcf2fac2a07.exe Token: SeDebugPrivilege 4932 5fd523b7147afde2679a7fcf2fac2a07.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5fd523b7147afde2679a7fcf2fac2a07.exedescription pid process target process PID 4864 wrote to memory of 4932 4864 5fd523b7147afde2679a7fcf2fac2a07.exe 5fd523b7147afde2679a7fcf2fac2a07.exe PID 4864 wrote to memory of 4932 4864 5fd523b7147afde2679a7fcf2fac2a07.exe 5fd523b7147afde2679a7fcf2fac2a07.exe PID 4864 wrote to memory of 4932 4864 5fd523b7147afde2679a7fcf2fac2a07.exe 5fd523b7147afde2679a7fcf2fac2a07.exe PID 4864 wrote to memory of 4932 4864 5fd523b7147afde2679a7fcf2fac2a07.exe 5fd523b7147afde2679a7fcf2fac2a07.exe PID 4864 wrote to memory of 4932 4864 5fd523b7147afde2679a7fcf2fac2a07.exe 5fd523b7147afde2679a7fcf2fac2a07.exe PID 4864 wrote to memory of 4932 4864 5fd523b7147afde2679a7fcf2fac2a07.exe 5fd523b7147afde2679a7fcf2fac2a07.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\5fd523b7147afde2679a7fcf2fac2a07.exe"C:\Users\Admin\AppData\Local\Temp\5fd523b7147afde2679a7fcf2fac2a07.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\5fd523b7147afde2679a7fcf2fac2a07.exe"C:\Users\Admin\AppData\Local\Temp\5fd523b7147afde2679a7fcf2fac2a07.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4932