Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe
Resource
win10v2004-20241007-en
General
-
Target
124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe
-
Size
453KB
-
MD5
0149756b625d3dfada590f2d919a6c78
-
SHA1
c055376148964f0df993e5564bc5d8d46cc66a3e
-
SHA256
124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee
-
SHA512
14ebf2be80d8b4e26215c32080fba0c9dc63f1b79d4c66009a0c9961b9fad25908fcbaba5cfe05c6965cb94bdb27ce747342a6b1d1f9a9535fa0b6ff73521247
-
SSDEEP
12288:imKmKST6CTQNb/QMp3UoyuATA7rQmDjrh/:5VT7iFp3r7E2jp
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exedescription pid Process procid_target PID 1048 created 416 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 5 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exedescription pid Process procid_target PID 1048 set thread context of 1740 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 29 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exedllhost.exepid Process 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe 1740 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exedllhost.exesvchost.exedescription pid Process Token: SeDebugPrivilege 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe Token: SeDebugPrivilege 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe Token: SeDebugPrivilege 1740 dllhost.exe Token: SeAuditPrivilege 852 svchost.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exedllhost.exedescription pid Process procid_target PID 1048 wrote to memory of 1740 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 29 PID 1048 wrote to memory of 1740 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 29 PID 1048 wrote to memory of 1740 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 29 PID 1048 wrote to memory of 1740 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 29 PID 1048 wrote to memory of 1740 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 29 PID 1048 wrote to memory of 1740 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 29 PID 1048 wrote to memory of 1740 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 29 PID 1048 wrote to memory of 1740 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 29 PID 1048 wrote to memory of 1740 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 29 PID 1048 wrote to memory of 1740 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 29 PID 1048 wrote to memory of 1740 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 29 PID 1048 wrote to memory of 1740 1048 124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe 29 PID 1740 wrote to memory of 416 1740 dllhost.exe 5 PID 1740 wrote to memory of 460 1740 dllhost.exe 6 PID 1740 wrote to memory of 476 1740 dllhost.exe 7 PID 1740 wrote to memory of 484 1740 dllhost.exe 8 PID 1740 wrote to memory of 596 1740 dllhost.exe 9 PID 1740 wrote to memory of 676 1740 dllhost.exe 10 PID 1740 wrote to memory of 748 1740 dllhost.exe 11 PID 1740 wrote to memory of 816 1740 dllhost.exe 12 PID 1740 wrote to memory of 852 1740 dllhost.exe 13 PID 1740 wrote to memory of 996 1740 dllhost.exe 15 PID 1740 wrote to memory of 300 1740 dllhost.exe 16 PID 1740 wrote to memory of 536 1740 dllhost.exe 17 PID 1740 wrote to memory of 1076 1740 dllhost.exe 18 PID 1740 wrote to memory of 1108 1740 dllhost.exe 19 PID 1740 wrote to memory of 1164 1740 dllhost.exe 20 PID 1740 wrote to memory of 1220 1740 dllhost.exe 21 PID 1740 wrote to memory of 1244 1740 dllhost.exe 23 PID 1740 wrote to memory of 512 1740 dllhost.exe 24 PID 1740 wrote to memory of 1852 1740 dllhost.exe 25 PID 1740 wrote to memory of 2148 1740 dllhost.exe 26
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{ea8fd92e-38fa-479d-9ff5-9ca96bb7b7df}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740
-
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:596
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:1244
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe3⤵PID:2148
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:676
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:748
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1164
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:996
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:300
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:536
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1076
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1108
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:512
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1852
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:484
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe"C:\Users\Admin\AppData\Local\Temp\124a16256c1da60325903fac3ba042ab548d8fae44905705b201bccddee174ee.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048
-