Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
27-09-2020 00:33
Static task
static1
Behavioral task
behavioral1
Sample
e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe
Resource
win7v200722
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe
-
Size
379KB
-
MD5
9f00d78f2e8e4523773a264f85be1c02
-
SHA1
3c542144a7a03134060bd666206a106bcea95e5a
-
SHA256
e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e
-
SHA512
5760967703d0702d4c855b75c895a2432c809ca8f945f2a80914f21b3c8129c4bbf155bac4bb5fa6b03e868b3d33cfbe1b3321a7b438741cd62d1c3323d38928
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Windows\CurrentVersion\Run\Skype Remote Control = "C:\\Users\\Admin\\AppData\\Local\\Temp\\e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe" e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe Key created \REGISTRY\USER\S-1-5-21-403932158-3302036622-1224131197-1000\Software\Microsoft\Windows\CurrentVersion\Run e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 1584 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.execmd.exedescription pid Process procid_target PID 1048 wrote to memory of 1608 1048 e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe 28 PID 1048 wrote to memory of 1608 1048 e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe 28 PID 1048 wrote to memory of 1608 1048 e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe 28 PID 1608 wrote to memory of 1584 1608 cmd.exe 30 PID 1608 wrote to memory of 1584 1608 cmd.exe 30 PID 1608 wrote to memory of 1584 1608 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe"C:\Users\Admin\AppData\Local\Temp\e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\cmd.execmd /c TIMEOUT /T 50 /NOBREAK && move "C:\Users\Admin\AppData\Local\Temp\iymvtslqhs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Control Panel.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\system32\timeout.exeTIMEOUT /T 50 /NOBREAK3⤵
- Delays execution with timeout.exe
PID:1584
-
-