Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows10_x64 -
resource
win10 -
submitted
19/07/2020, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
f6521e298c849c14cd0a4d0e8947fa2d990e06d978e89a262e62c968cefd9b8f.bin.exe
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f6521e298c849c14cd0a4d0e8947fa2d990e06d978e89a262e62c968cefd9b8f.bin.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
f6521e298c849c14cd0a4d0e8947fa2d990e06d978e89a262e62c968cefd9b8f.bin.exe
-
Size
252KB
-
MD5
6dbce1851b656de5f49eb1d8c9786b72
-
SHA1
e63a7e56571b100c6acd02ba892ed35e97b35fe1
-
SHA256
f6521e298c849c14cd0a4d0e8947fa2d990e06d978e89a262e62c968cefd9b8f
-
SHA512
ab89353957f9b369b8cd3d61c64c4d3cd82a1f2e1a454d496d20c87da2b60baeb679aa803f0f50f5c1fd835992528c02f03ab5f692e1dc5ab6385ecd75e09760
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 3360 dw20.exe Token: SeBackupPrivilege 3360 dw20.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3360 dw20.exe 3360 dw20.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3236 wrote to memory of 3360 3236 f6521e298c849c14cd0a4d0e8947fa2d990e06d978e89a262e62c968cefd9b8f.bin.exe 67 PID 3236 wrote to memory of 3360 3236 f6521e298c849c14cd0a4d0e8947fa2d990e06d978e89a262e62c968cefd9b8f.bin.exe 67 PID 3236 wrote to memory of 3360 3236 f6521e298c849c14cd0a4d0e8947fa2d990e06d978e89a262e62c968cefd9b8f.bin.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6521e298c849c14cd0a4d0e8947fa2d990e06d978e89a262e62c968cefd9b8f.bin.exe"C:\Users\Admin\AppData\Local\Temp\f6521e298c849c14cd0a4d0e8947fa2d990e06d978e89a262e62c968cefd9b8f.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7442⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3360
-