Analysis
-
max time kernel
3s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:37
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
1.exe
-
Size
2.7MB
-
MD5
5a4135a79283d211cf21820a67e01a4f
-
SHA1
fd1a1709b4346a4ca307d01cb85b5d6beb633733
-
SHA256
2ba2c20a826f51ed753f4f4dd78118d6f371a2fd5b4b0a2ff640c8f046d4fb55
-
SHA512
c6aa36b7326a461179dc0c8c14dc3552ccbf22d72490ee1d7ca90b3c9177538eff8e16258a2e42ab59b4c5999c25e420981dfc9e2fb6d4a1cc509c2c9534813b
Score
1/10
Malware Config
Signatures
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1916 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1.execmd.exedescription pid process target process PID 1700 wrote to memory of 1904 1700 1.exe cmd.exe PID 1700 wrote to memory of 1904 1700 1.exe cmd.exe PID 1700 wrote to memory of 1904 1700 1.exe cmd.exe PID 1904 wrote to memory of 1916 1904 cmd.exe taskkill.exe PID 1904 wrote to memory of 1916 1904 cmd.exe taskkill.exe PID 1904 wrote to memory of 1916 1904 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\cmd.execmd /C "taskkill /F /IM sqlservr.exe /T"2⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\taskkill.exetaskkill /F /IM sqlservr.exe /T3⤵
- Kills process with taskkill
PID:1916
-
-