Analysis
-
max time kernel
62s -
max time network
64s -
platform
windows7_x64 -
resource
win7 -
submitted
19-07-2020 09:55
Static task
static1
Behavioral task
behavioral1
Sample
111ad964219b61522ae20b036702d096.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
111ad964219b61522ae20b036702d096.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
111ad964219b61522ae20b036702d096.exe
-
Size
957KB
-
MD5
111ad964219b61522ae20b036702d096
-
SHA1
184bab164050233a8d72541decbc4437f2122843
-
SHA256
dfb1f00592d6264a6bf3ad8b02187dfad62d1526fa5b32e667cd6bf884d4db85
-
SHA512
09ea9830cb7508594818e25cddd03aef055b0cdc517f8270197b0798648007cfe2cc2bfd763a838067436d8a229a0c7a24ef6fa016eec07464c8e4d793798b6e
Score
5/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1304 1104 111ad964219b61522ae20b036702d096.exe 24 PID 1104 wrote to memory of 1304 1104 111ad964219b61522ae20b036702d096.exe 24 PID 1104 wrote to memory of 1304 1104 111ad964219b61522ae20b036702d096.exe 24 PID 1104 wrote to memory of 1304 1104 111ad964219b61522ae20b036702d096.exe 24 PID 1104 wrote to memory of 1304 1104 111ad964219b61522ae20b036702d096.exe 24 PID 1104 wrote to memory of 1304 1104 111ad964219b61522ae20b036702d096.exe 24 PID 1104 wrote to memory of 1304 1104 111ad964219b61522ae20b036702d096.exe 24 PID 1104 wrote to memory of 1304 1104 111ad964219b61522ae20b036702d096.exe 24 PID 1104 wrote to memory of 1304 1104 111ad964219b61522ae20b036702d096.exe 24 PID 1104 wrote to memory of 1304 1104 111ad964219b61522ae20b036702d096.exe 24 PID 1104 wrote to memory of 1304 1104 111ad964219b61522ae20b036702d096.exe 24 PID 1104 wrote to memory of 1304 1104 111ad964219b61522ae20b036702d096.exe 24 PID 1304 wrote to memory of 276 1304 RegAsm.exe 25 PID 1304 wrote to memory of 276 1304 RegAsm.exe 25 PID 1304 wrote to memory of 276 1304 RegAsm.exe 25 PID 1304 wrote to memory of 276 1304 RegAsm.exe 25 PID 276 wrote to memory of 1088 276 cmd.exe 27 PID 276 wrote to memory of 1088 276 cmd.exe 27 PID 276 wrote to memory of 1088 276 cmd.exe 27 PID 276 wrote to memory of 1088 276 cmd.exe 27 PID 276 wrote to memory of 1832 276 cmd.exe 29 PID 276 wrote to memory of 1832 276 cmd.exe 29 PID 276 wrote to memory of 1832 276 cmd.exe 29 PID 276 wrote to memory of 1832 276 cmd.exe 29 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1104 set thread context of 1304 1104 111ad964219b61522ae20b036702d096.exe 24 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1304 RegAsm.exe Token: SeDebugPrivilege 1088 taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 1088 taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\111ad964219b61522ae20b036702d096.exe"C:\Users\Admin\AppData\Local\Temp\111ad964219b61522ae20b036702d096.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1104 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
PID:1304 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 1304 && choice /C Y /N /D Y /T 3 & Del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 13044⤵
- Suspicious use of AdjustPrivilegeToken
- Kills process with taskkill
PID:1088
-
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵PID:1832
-
-
-