Analysis
-
max time kernel
129s -
max time network
44s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
15/07/2020, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.KillProc2.11135.18357.30089.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.KillProc2.11135.18357.30089.exe
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Trojan.KillProc2.11135.18357.30089.exe
-
Size
444KB
-
MD5
eda68c8ee39bb02493c6ab551b84b02d
-
SHA1
4d8688dbe830e7d17f52919be8bfc91b9fa8a064
-
SHA256
01d43d7cb3dbec2a63010278022dfc40b9ae38d39ac709e06c612635ad0fe51a
-
SHA512
8210a56f7d9fff989a52f8f5cdf25e291772709799d1164e30763993cda3f9dffccff1da0f210f77c97a37eeb53d8f16a8334ba042d243a66840756b4fdd0e53
Score
5/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1020 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1020 RegAsm.exe 1020 RegAsm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1020 1492 SecuriteInfo.com.Trojan.KillProc2.11135.18357.30089.exe 72 PID 1492 wrote to memory of 1020 1492 SecuriteInfo.com.Trojan.KillProc2.11135.18357.30089.exe 72 PID 1492 wrote to memory of 1020 1492 SecuriteInfo.com.Trojan.KillProc2.11135.18357.30089.exe 72 PID 1492 wrote to memory of 1020 1492 SecuriteInfo.com.Trojan.KillProc2.11135.18357.30089.exe 72 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1492 SecuriteInfo.com.Trojan.KillProc2.11135.18357.30089.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 1020 1492 SecuriteInfo.com.Trojan.KillProc2.11135.18357.30089.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.KillProc2.11135.18357.30089.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.KillProc2.11135.18357.30089.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
PID:1492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1020
-