Analysis
-
max time kernel
147s -
max time network
41s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
08-07-2020 08:23
Static task
static1
Behavioral task
behavioral1
Sample
a59495fd47a8bb187c6e2cd9953e14a0.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
a59495fd47a8bb187c6e2cd9953e14a0.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
a59495fd47a8bb187c6e2cd9953e14a0.exe
-
Size
872KB
-
MD5
a59495fd47a8bb187c6e2cd9953e14a0
-
SHA1
a8f89bc4231d002227191603116808b7df11f9df
-
SHA256
7510841337a460d3848fac1c9e0977992d9b8098a7444117bdc3d00e7c3a30f3
-
SHA512
482f09758dfba61d994ed8d4e23ff8008f676faf27234b516ad834cd7e58f735fb39f4e69c7be355e1d757866846148b6e57d076714eec8ceca3d980c6295519
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
a59495fd47a8bb187c6e2cd9953e14a0.exedescription pid process target process PID 1292 wrote to memory of 1684 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1684 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1684 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1684 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1336 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1336 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1336 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1336 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1364 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1364 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1364 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1364 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1224 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1224 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1224 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1224 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1796 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1796 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1796 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe PID 1292 wrote to memory of 1796 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe a59495fd47a8bb187c6e2cd9953e14a0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a59495fd47a8bb187c6e2cd9953e14a0.exedescription pid process Token: SeDebugPrivilege 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
a59495fd47a8bb187c6e2cd9953e14a0.exepid process 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe 1292 a59495fd47a8bb187c6e2cd9953e14a0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe"C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe"{path}"2⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe"{path}"2⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe"{path}"2⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe"{path}"2⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe"{path}"2⤵PID:1796