Analysis
-
max time kernel
38s -
max time network
11s -
platform
windows7_x64 -
resource
win7 -
submitted
28-08-2020 06:33
Static task
static1
Behavioral task
behavioral1
Sample
1XrdOdPqR6jBVMu.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
1XrdOdPqR6jBVMu.exe
-
Size
507KB
-
MD5
e5a4d65f4234001c405be18760073317
-
SHA1
9aaf994aa6cee464fde60749d9a1aba698199b41
-
SHA256
021f4846815c6c2c0fcd2a808054c52c0569526bd4fb049b47ceb061e822d354
-
SHA512
27892695e298ac1be6f982b97be4a9da56ed31031c3cb83d8e98815d1676442672aa3626a8a14782e638fa988a96dcb3229c72356374f7193fc8ee7469fdcc69
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
1XrdOdPqR6jBVMu.exepid process 1156 1XrdOdPqR6jBVMu.exe 1156 1XrdOdPqR6jBVMu.exe 1156 1XrdOdPqR6jBVMu.exe 1156 1XrdOdPqR6jBVMu.exe 1156 1XrdOdPqR6jBVMu.exe 1156 1XrdOdPqR6jBVMu.exe 1156 1XrdOdPqR6jBVMu.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1XrdOdPqR6jBVMu.exedescription pid process Token: SeDebugPrivilege 1156 1XrdOdPqR6jBVMu.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
1XrdOdPqR6jBVMu.exedescription pid process target process PID 1156 wrote to memory of 1848 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1848 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1848 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1848 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1864 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1864 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1864 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1864 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1920 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1920 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1920 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1920 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1952 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1952 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1952 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1952 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1960 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1960 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1960 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe PID 1156 wrote to memory of 1960 1156 1XrdOdPqR6jBVMu.exe 1XrdOdPqR6jBVMu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1XrdOdPqR6jBVMu.exe"C:\Users\Admin\AppData\Local\Temp\1XrdOdPqR6jBVMu.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\1XrdOdPqR6jBVMu.exe"{path}"2⤵PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\1XrdOdPqR6jBVMu.exe"{path}"2⤵PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\1XrdOdPqR6jBVMu.exe"{path}"2⤵PID:1920
-
-
C:\Users\Admin\AppData\Local\Temp\1XrdOdPqR6jBVMu.exe"{path}"2⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\1XrdOdPqR6jBVMu.exe"{path}"2⤵PID:1960
-