Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
08-07-2020 07:12
Static task
static1
Behavioral task
behavioral1
Sample
gSbuXvKOQIYVuix.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
gSbuXvKOQIYVuix.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
gSbuXvKOQIYVuix.exe
-
Size
792KB
-
MD5
09423dffc51de71516d493ed13b85565
-
SHA1
062c4ca2d8c2832f0568cd68eecbbce04bc88791
-
SHA256
ce2fb70594dabbee01ba985e6e04a5fbdc57b2d589722dab7213c999151efcef
-
SHA512
41bddb0ed9b974fd0ce4d85f716f8e94a31424e5b27c8ad5672dff24a587f7c6b03d95ca57433cdd229fac9518724b60f5e00bbbcacd5e49e7be72459dfbba75
Score
5/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
gSbuXvKOQIYVuix.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 1612 wrote to memory of 3228 1612 gSbuXvKOQIYVuix.exe schtasks.exe PID 1612 wrote to memory of 3228 1612 gSbuXvKOQIYVuix.exe schtasks.exe PID 1612 wrote to memory of 3228 1612 gSbuXvKOQIYVuix.exe schtasks.exe PID 1612 wrote to memory of 3692 1612 gSbuXvKOQIYVuix.exe gSbuXvKOQIYVuix.exe PID 1612 wrote to memory of 3692 1612 gSbuXvKOQIYVuix.exe gSbuXvKOQIYVuix.exe PID 1612 wrote to memory of 3692 1612 gSbuXvKOQIYVuix.exe gSbuXvKOQIYVuix.exe PID 1612 wrote to memory of 3812 1612 gSbuXvKOQIYVuix.exe gSbuXvKOQIYVuix.exe PID 1612 wrote to memory of 3812 1612 gSbuXvKOQIYVuix.exe gSbuXvKOQIYVuix.exe PID 1612 wrote to memory of 3812 1612 gSbuXvKOQIYVuix.exe gSbuXvKOQIYVuix.exe PID 1612 wrote to memory of 3812 1612 gSbuXvKOQIYVuix.exe gSbuXvKOQIYVuix.exe PID 1612 wrote to memory of 3812 1612 gSbuXvKOQIYVuix.exe gSbuXvKOQIYVuix.exe PID 1612 wrote to memory of 3812 1612 gSbuXvKOQIYVuix.exe gSbuXvKOQIYVuix.exe PID 2952 wrote to memory of 2964 2952 Explorer.EXE colorcpl.exe PID 2952 wrote to memory of 2964 2952 Explorer.EXE colorcpl.exe PID 2952 wrote to memory of 2964 2952 Explorer.EXE colorcpl.exe PID 2964 wrote to memory of 3868 2964 colorcpl.exe cmd.exe PID 2964 wrote to memory of 3868 2964 colorcpl.exe cmd.exe PID 2964 wrote to memory of 3868 2964 colorcpl.exe cmd.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
gSbuXvKOQIYVuix.exegSbuXvKOQIYVuix.execolorcpl.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1612 gSbuXvKOQIYVuix.exe Token: SeDebugPrivilege 3812 gSbuXvKOQIYVuix.exe Token: SeDebugPrivilege 2964 colorcpl.exe Token: SeShutdownPrivilege 2952 Explorer.EXE Token: SeCreatePagefilePrivilege 2952 Explorer.EXE Token: SeShutdownPrivilege 2952 Explorer.EXE Token: SeCreatePagefilePrivilege 2952 Explorer.EXE Token: SeShutdownPrivilege 2952 Explorer.EXE Token: SeCreatePagefilePrivilege 2952 Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
gSbuXvKOQIYVuix.exegSbuXvKOQIYVuix.execolorcpl.exepid process 1612 gSbuXvKOQIYVuix.exe 1612 gSbuXvKOQIYVuix.exe 3812 gSbuXvKOQIYVuix.exe 3812 gSbuXvKOQIYVuix.exe 3812 gSbuXvKOQIYVuix.exe 3812 gSbuXvKOQIYVuix.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe 2964 colorcpl.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
gSbuXvKOQIYVuix.exegSbuXvKOQIYVuix.execolorcpl.exedescription pid process target process PID 1612 set thread context of 3812 1612 gSbuXvKOQIYVuix.exe gSbuXvKOQIYVuix.exe PID 3812 set thread context of 2952 3812 gSbuXvKOQIYVuix.exe Explorer.EXE PID 2964 set thread context of 2952 2964 colorcpl.exe Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
gSbuXvKOQIYVuix.execolorcpl.exepid process 3812 gSbuXvKOQIYVuix.exe 3812 gSbuXvKOQIYVuix.exe 3812 gSbuXvKOQIYVuix.exe 2964 colorcpl.exe 2964 colorcpl.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\gSbuXvKOQIYVuix.exe"C:\Users\Admin\AppData\Local\Temp\gSbuXvKOQIYVuix.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
PID:1612 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\Zvxyhn" /XML "C:\Users\Admin\AppData\Local\Temp\tmp814B.tmp"3⤵
- Creates scheduled task(s)
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\gSbuXvKOQIYVuix.exe"{path}"3⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\gSbuXvKOQIYVuix.exe"{path}"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3812 -
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:2964 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\gSbuXvKOQIYVuix.exe"3⤵PID:3868