Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10 -
submitted
13/07/2020, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
1a6014d5372cb9cc90f6fcd84e85a0b5.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1a6014d5372cb9cc90f6fcd84e85a0b5.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
1a6014d5372cb9cc90f6fcd84e85a0b5.exe
-
Size
1.3MB
-
MD5
1a6014d5372cb9cc90f6fcd84e85a0b5
-
SHA1
d12df5828471f094c7a268c9564ddc7ea19a4540
-
SHA256
419fdd95959d3b4a086ad9009775e08bde4867593bffc22e05e19d89606698f4
-
SHA512
e2afb15977c7f43ba0b82509a3651b9d085ed11bcc0c8113527b001f5df78a1dad0384e157f132e57ce4975da357c08234eb135dbfd7aa2f043935a7a4bf9af0
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3924 images.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3356 3796 WerFault.exe 68 1500 1940 WerFault.exe 74 -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3356 WerFault.exe Token: SeBackupPrivilege 3356 WerFault.exe Token: SeDebugPrivilege 3356 WerFault.exe Token: SeDebugPrivilege 1500 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 3356 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe 1500 WerFault.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat 1a6014d5372cb9cc90f6fcd84e85a0b5.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\programs.bat:start 1a6014d5372cb9cc90f6fcd84e85a0b5.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\ProgramData:ApplicationData 1a6014d5372cb9cc90f6fcd84e85a0b5.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Images = "C:\\ProgramData\\images.exe" 1a6014d5372cb9cc90f6fcd84e85a0b5.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 720 wrote to memory of 3796 720 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 68 PID 720 wrote to memory of 3796 720 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 68 PID 720 wrote to memory of 3796 720 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 68 PID 720 wrote to memory of 3924 720 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 70 PID 720 wrote to memory of 3924 720 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 70 PID 720 wrote to memory of 3924 720 1a6014d5372cb9cc90f6fcd84e85a0b5.exe 70 PID 3924 wrote to memory of 1940 3924 images.exe 74 PID 3924 wrote to memory of 1940 3924 images.exe 74 PID 3924 wrote to memory of 1940 3924 images.exe 74 PID 3924 wrote to memory of 984 3924 images.exe 75 PID 3924 wrote to memory of 984 3924 images.exe 75 PID 3924 wrote to memory of 984 3924 images.exe 75 PID 3924 wrote to memory of 984 3924 images.exe 75 PID 3924 wrote to memory of 984 3924 images.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a6014d5372cb9cc90f6fcd84e85a0b5.exe"C:\Users\Admin\AppData\Local\Temp\1a6014d5372cb9cc90f6fcd84e85a0b5.exe"1⤵
- Drops startup file
- NTFS ADS
- Adds Run entry to start application
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\2⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 7003⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
-
-
C:\ProgramData\images.exe"C:\ProgramData\images.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵PID:1940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 7004⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵PID:984
-
-