Analysis
-
max time kernel
146s -
max time network
26s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
16-07-2020 08:05
Static task
static1
Behavioral task
behavioral1
Sample
PO# 459ARG1672020.scr
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
PO# 459ARG1672020.scr
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
PO# 459ARG1672020.scr
-
Size
709KB
-
MD5
64e367c58afd3f0b145184e91dbbc808
-
SHA1
a52a8e3d0051798672c435ac41cdfc8ac668a80a
-
SHA256
6da9729b89ad6b0aff3f94e20754a9d46185fe0c9076aa950ddf8e4e720e5ef0
-
SHA512
be5f65e091f171c3b749b421596906995b9280e573b2c05f78070cabd9d67fbf0550f59d78a32279ee0b967265f02d21b1caf8b96e1825c71eef9e7dbe78ac67
Score
8/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1292 PO# 459ARG1672020.scr Token: SeDebugPrivilege 768 window.exe Token: SeDebugPrivilege 1632 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1292 PO# 459ARG1672020.scr 1292 PO# 459ARG1672020.scr 1292 PO# 459ARG1672020.scr 768 window.exe 768 window.exe 768 window.exe 1632 InstallUtil.exe 1632 InstallUtil.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1796 1292 PO# 459ARG1672020.scr 26 PID 1292 wrote to memory of 1796 1292 PO# 459ARG1672020.scr 26 PID 1292 wrote to memory of 1796 1292 PO# 459ARG1672020.scr 26 PID 1292 wrote to memory of 1796 1292 PO# 459ARG1672020.scr 26 PID 1796 wrote to memory of 1780 1796 cmd.exe 28 PID 1796 wrote to memory of 1780 1796 cmd.exe 28 PID 1796 wrote to memory of 1780 1796 cmd.exe 28 PID 1796 wrote to memory of 1780 1796 cmd.exe 28 PID 1292 wrote to memory of 768 1292 PO# 459ARG1672020.scr 29 PID 1292 wrote to memory of 768 1292 PO# 459ARG1672020.scr 29 PID 1292 wrote to memory of 768 1292 PO# 459ARG1672020.scr 29 PID 1292 wrote to memory of 768 1292 PO# 459ARG1672020.scr 29 PID 768 wrote to memory of 1632 768 window.exe 30 PID 768 wrote to memory of 1632 768 window.exe 30 PID 768 wrote to memory of 1632 768 window.exe 30 PID 768 wrote to memory of 1632 768 window.exe 30 PID 768 wrote to memory of 1632 768 window.exe 30 PID 768 wrote to memory of 1632 768 window.exe 30 PID 768 wrote to memory of 1632 768 window.exe 30 PID 768 wrote to memory of 1632 768 window.exe 30 PID 768 wrote to memory of 1632 768 window.exe 30 PID 768 wrote to memory of 1632 768 window.exe 30 PID 768 wrote to memory of 1632 768 window.exe 30 PID 768 wrote to memory of 1632 768 window.exe 30 -
Loads dropped DLL 2 IoCs
pid Process 1292 PO# 459ARG1672020.scr 768 window.exe -
Executes dropped EXE 2 IoCs
pid Process 768 window.exe 1632 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 768 set thread context of 1632 768 window.exe 30 -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\window = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\Music\\window.exe" reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO# 459ARG1672020.scr"C:\Users\Admin\AppData\Local\Temp\PO# 459ARG1672020.scr" /S1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
PID:1292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v window /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Music\window.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v window /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\Music\window.exe"3⤵
- Adds Run key to start application
PID:1780
-
-
-
C:\Users\Admin\Music\window.exe"C:\Users\Admin\Music\window.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:768 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
PID:1632
-
-