Analysis
-
max time kernel
144s -
max time network
154s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
13/07/2020, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
1a6014d5372cb9cc90f6fcd84e85a0b5.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1a6014d5372cb9cc90f6fcd84e85a0b5.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
1a6014d5372cb9cc90f6fcd84e85a0b5.exe
-
Size
1.3MB
-
MD5
1a6014d5372cb9cc90f6fcd84e85a0b5
-
SHA1
d12df5828471f094c7a268c9564ddc7ea19a4540
-
SHA256
419fdd95959d3b4a086ad9009775e08bde4867593bffc22e05e19d89606698f4
-
SHA512
e2afb15977c7f43ba0b82509a3651b9d085ed11bcc0c8113527b001f5df78a1dad0384e157f132e57ce4975da357c08234eb135dbfd7aa2f043935a7a4bf9af0
Score
8/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1764 1312 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 27 PID 1312 wrote to memory of 1764 1312 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 27 PID 1312 wrote to memory of 1764 1312 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 27 PID 1312 wrote to memory of 1764 1312 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 27 PID 1312 wrote to memory of 1804 1312 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 29 PID 1312 wrote to memory of 1804 1312 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 29 PID 1312 wrote to memory of 1804 1312 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 29 PID 1312 wrote to memory of 1804 1312 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 29 PID 1804 wrote to memory of 1324 1804 images.exe 31 PID 1804 wrote to memory of 1324 1804 images.exe 31 PID 1804 wrote to memory of 1324 1804 images.exe 31 PID 1804 wrote to memory of 1324 1804 images.exe 31 PID 1804 wrote to memory of 1516 1804 images.exe 33 PID 1804 wrote to memory of 1516 1804 images.exe 33 PID 1804 wrote to memory of 1516 1804 images.exe 33 PID 1804 wrote to memory of 1516 1804 images.exe 33 PID 1804 wrote to memory of 1516 1804 images.exe 33 PID 1804 wrote to memory of 1516 1804 images.exe 33 -
Loads dropped DLL 1 IoCs
pid Process 1312 1a6014d5372cb9cc90f6fcd84e85a0b5.exe -
Executes dropped EXE 1 IoCs
pid Process 1804 images.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1764 powershell.exe Token: SeDebugPrivilege 1324 powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1764 powershell.exe 1764 powershell.exe 1324 powershell.exe 1324 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat 1a6014d5372cb9cc90f6fcd84e85a0b5.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat:start 1a6014d5372cb9cc90f6fcd84e85a0b5.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\ProgramData:ApplicationData 1a6014d5372cb9cc90f6fcd84e85a0b5.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" 1a6014d5372cb9cc90f6fcd84e85a0b5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a6014d5372cb9cc90f6fcd84e85a0b5.exe"C:\Users\Admin\AppData\Local\Temp\1a6014d5372cb9cc90f6fcd84e85a0b5.exe"1⤵
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
- Drops startup file
- NTFS ADS
- Adds Run entry to start application
PID:1312 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1764
-
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Suspicious use of WriteProcessMemory
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1324
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:1516
-
-