Analysis
-
max time kernel
136s -
max time network
50s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07-07-2020 09:11
Static task
static1
Behavioral task
behavioral1
Sample
Shipment doc, INV,BL+PL.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Shipment doc, INV,BL+PL.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
Shipment doc, INV,BL+PL.exe
-
Size
458KB
-
MD5
c2c075d90b26a93560b684c1d11e3257
-
SHA1
16f34e7ac25b9b317abd82d57484b1ee194b928a
-
SHA256
629ec1eb6367512fcb4d7c5e83eb110401ea58cd121cbb8ff0d29f6792a1250f
-
SHA512
f8d2a5d37979cf3112a7e12c2147398f9f5174d44ed02338cb96fa98ac91c469e874c831887c6612db75baf11186e4c77a5c90048dde2ffa2cbc4008813783d9
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3848 wrote to memory of 2184 3848 Shipment doc, INV,BL+PL.exe 72 PID 3848 wrote to memory of 2184 3848 Shipment doc, INV,BL+PL.exe 72 PID 3848 wrote to memory of 2728 3848 Shipment doc, INV,BL+PL.exe 74 PID 3848 wrote to memory of 2728 3848 Shipment doc, INV,BL+PL.exe 74 PID 3848 wrote to memory of 2772 3848 Shipment doc, INV,BL+PL.exe 75 PID 3848 wrote to memory of 2772 3848 Shipment doc, INV,BL+PL.exe 75 PID 3848 wrote to memory of 2804 3848 Shipment doc, INV,BL+PL.exe 76 PID 3848 wrote to memory of 2804 3848 Shipment doc, INV,BL+PL.exe 76 PID 3848 wrote to memory of 2868 3848 Shipment doc, INV,BL+PL.exe 77 PID 3848 wrote to memory of 2868 3848 Shipment doc, INV,BL+PL.exe 77 PID 3848 wrote to memory of 3008 3848 Shipment doc, INV,BL+PL.exe 78 PID 3848 wrote to memory of 3008 3848 Shipment doc, INV,BL+PL.exe 78 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3848 Shipment doc, INV,BL+PL.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3848 Shipment doc, INV,BL+PL.exe 3848 Shipment doc, INV,BL+PL.exe 3848 Shipment doc, INV,BL+PL.exe 3848 Shipment doc, INV,BL+PL.exe 3848 Shipment doc, INV,BL+PL.exe 3848 Shipment doc, INV,BL+PL.exe 3848 Shipment doc, INV,BL+PL.exe 3848 Shipment doc, INV,BL+PL.exe 3848 Shipment doc, INV,BL+PL.exe 3848 Shipment doc, INV,BL+PL.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2184 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipment doc, INV,BL+PL.exe"C:\Users\Admin\AppData\Local\Temp\Shipment doc, INV,BL+PL.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3848 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WjVeyCQw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4F5E.tmp"2⤵
- Creates scheduled task(s)
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\Shipment doc, INV,BL+PL.exe"{path}"2⤵PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\Shipment doc, INV,BL+PL.exe"{path}"2⤵PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\Shipment doc, INV,BL+PL.exe"{path}"2⤵PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\Shipment doc, INV,BL+PL.exe"{path}"2⤵PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\Shipment doc, INV,BL+PL.exe"{path}"2⤵PID:3008
-