Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
19-07-2020 17:33
Static task
static1
Behavioral task
behavioral1
Sample
uncategorized_1.2.0.1.vir.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
uncategorized_1.2.0.1.vir.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
uncategorized_1.2.0.1.vir.exe
-
Size
304KB
-
MD5
a0173bd7d459e734f3417e40e612bb0c
-
SHA1
f107596acaa9e7a0916a46a68db923e3ab228be1
-
SHA256
f06047b09abc77529969c5949deda36ff154539d1b9ed8942c22fbb307d8aac9
-
SHA512
310fff512b750c5eab7361c1c23906d78353d8443fe0c95454e0ff9afce930f183ad37c3ac8ba8bb1ce8428443929a32d47ec641279272b96e60d6df96c0674b
Score
5/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
uncategorized_1.2.0.1.vir.exedescription pid process target process PID 4024 wrote to memory of 2088 4024 uncategorized_1.2.0.1.vir.exe uncategorized_1.2.0.1.vir.exe PID 4024 wrote to memory of 2088 4024 uncategorized_1.2.0.1.vir.exe uncategorized_1.2.0.1.vir.exe PID 4024 wrote to memory of 2088 4024 uncategorized_1.2.0.1.vir.exe uncategorized_1.2.0.1.vir.exe PID 4024 wrote to memory of 2088 4024 uncategorized_1.2.0.1.vir.exe uncategorized_1.2.0.1.vir.exe PID 4024 wrote to memory of 2088 4024 uncategorized_1.2.0.1.vir.exe uncategorized_1.2.0.1.vir.exe PID 4024 wrote to memory of 2088 4024 uncategorized_1.2.0.1.vir.exe uncategorized_1.2.0.1.vir.exe PID 4024 wrote to memory of 2088 4024 uncategorized_1.2.0.1.vir.exe uncategorized_1.2.0.1.vir.exe PID 4024 wrote to memory of 2088 4024 uncategorized_1.2.0.1.vir.exe uncategorized_1.2.0.1.vir.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
uncategorized_1.2.0.1.vir.exedescription pid process target process PID 4024 set thread context of 2088 4024 uncategorized_1.2.0.1.vir.exe uncategorized_1.2.0.1.vir.exe -
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes
-
C:\Users\Admin\AppData\Local\Temp\uncategorized_1.2.0.1.vir.exe"C:\Users\Admin\AppData\Local\Temp\uncategorized_1.2.0.1.vir.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\uncategorized_1.2.0.1.vir.exe"C:\Users\Admin\AppData\Local\Temp\uncategorized_1.2.0.1.vir.exe"2⤵