Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7 -
submitted
16-07-2020 15:15
Static task
static1
Behavioral task
behavioral1
Sample
18490162.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
18490162.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
18490162.exe
-
Size
506KB
-
MD5
b05a1050b277928895e7550be42af992
-
SHA1
d34b50cb518808a0c47108cfb6f5cde7f7b08fad
-
SHA256
46b29fc514589a1671da29ef67c593086a66359a66ff800ca530887620d98bc6
-
SHA512
8bc5c7896bf12568f8b9136e424416e72ebde7a16181fd529a608b7fe63383eda073f8ca108c107d7e7f64ba171eec20b0bad2547e26e5cb113062a44dcaab87
Score
8/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1500 18490162.exe 1500 18490162.exe 1500 18490162.exe 1776 application.exe 1776 application.exe 1776 application.exe 1988 RegAsm.exe 1988 RegAsm.exe 2040 wlanext.exe 2040 wlanext.exe 2040 wlanext.exe 2040 wlanext.exe 2040 wlanext.exe 2040 wlanext.exe 2040 wlanext.exe 2040 wlanext.exe 2040 wlanext.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1040 1500 18490162.exe 24 PID 1500 wrote to memory of 1040 1500 18490162.exe 24 PID 1500 wrote to memory of 1040 1500 18490162.exe 24 PID 1500 wrote to memory of 1040 1500 18490162.exe 24 PID 1040 wrote to memory of 1516 1040 cmd.exe 26 PID 1040 wrote to memory of 1516 1040 cmd.exe 26 PID 1040 wrote to memory of 1516 1040 cmd.exe 26 PID 1040 wrote to memory of 1516 1040 cmd.exe 26 PID 1500 wrote to memory of 1776 1500 18490162.exe 27 PID 1500 wrote to memory of 1776 1500 18490162.exe 27 PID 1500 wrote to memory of 1776 1500 18490162.exe 27 PID 1500 wrote to memory of 1776 1500 18490162.exe 27 PID 1776 wrote to memory of 1988 1776 application.exe 30 PID 1776 wrote to memory of 1988 1776 application.exe 30 PID 1776 wrote to memory of 1988 1776 application.exe 30 PID 1776 wrote to memory of 1988 1776 application.exe 30 PID 1776 wrote to memory of 1988 1776 application.exe 30 PID 1776 wrote to memory of 1988 1776 application.exe 30 PID 1776 wrote to memory of 1988 1776 application.exe 30 PID 1776 wrote to memory of 1988 1776 application.exe 30 PID 1776 wrote to memory of 1988 1776 application.exe 30 PID 1776 wrote to memory of 1988 1776 application.exe 30 PID 1228 wrote to memory of 2040 1228 Explorer.EXE 31 PID 1228 wrote to memory of 2040 1228 Explorer.EXE 31 PID 1228 wrote to memory of 2040 1228 Explorer.EXE 31 PID 1228 wrote to memory of 2040 1228 Explorer.EXE 31 PID 2040 wrote to memory of 2016 2040 wlanext.exe 32 PID 2040 wrote to memory of 2016 2040 wlanext.exe 32 PID 2040 wrote to memory of 2016 2040 wlanext.exe 32 PID 2040 wrote to memory of 2016 2040 wlanext.exe 32 -
Loads dropped DLL 3 IoCs
pid Process 1500 18490162.exe 1776 application.exe 1988 RegAsm.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1988 RegAsm.exe 1988 RegAsm.exe 1988 RegAsm.exe 2040 wlanext.exe 2040 wlanext.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\application = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\application.exe" reg.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1500 18490162.exe Token: SeDebugPrivilege 1776 application.exe Token: SeDebugPrivilege 1988 RegAsm.exe Token: SeDebugPrivilege 2040 wlanext.exe -
Executes dropped EXE 2 IoCs
pid Process 1776 application.exe 1988 RegAsm.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1776 set thread context of 1988 1776 application.exe 30 PID 1988 set thread context of 1228 1988 RegAsm.exe 20 PID 2040 set thread context of 1228 2040 wlanext.exe 20 -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\18490162.exe"C:\Users\Admin\AppData\Local\Temp\18490162.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v application /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\application.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v application /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\application.exe"4⤵
- Adds Run key to start application
PID:1516
-
-
-
C:\Users\Admin\AppData\Roaming\application.exe"C:\Users\Admin\AppData\Roaming\application.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1988
-
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
PID:2040 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RegAsm.exe"3⤵PID:2016
-
-