Analysis
-
max time kernel
12s -
max time network
10s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-12-2020 08:52
Static task
static1
Behavioral task
behavioral1
Sample
nwamamassloga.scr
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
nwamamassloga.scr
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
nwamamassloga.scr
-
Size
6.0MB
-
MD5
8d3ae4916c4df02016b0ac0e900341e5
-
SHA1
6ccab03ec2c6ecfebc013dd39c84d03742f541e8
-
SHA256
d25be05d2b6dc4275fb36d639f4e3e4598e42b904d0748e0574941cb6899ba51
-
SHA512
8840533d06655949d54e8c7fba6a868c5244744226b574c4d5f25da84caddc4a6543bd7b5a8183278be29d0bdda5f29473a6c652f9d93ce6ad7278da41c2799f
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
nwamamassloga.scrpid process 848 nwamamassloga.scr 848 nwamamassloga.scr 848 nwamamassloga.scr 848 nwamamassloga.scr 848 nwamamassloga.scr 848 nwamamassloga.scr 848 nwamamassloga.scr 848 nwamamassloga.scr 848 nwamamassloga.scr 848 nwamamassloga.scr -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
nwamamassloga.scrdescription pid process Token: SeDebugPrivilege 848 nwamamassloga.scr -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
nwamamassloga.scrdescription pid process target process PID 848 wrote to memory of 1216 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1216 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1216 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1216 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1364 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1364 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1364 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1364 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1444 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1444 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1444 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1444 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1220 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1220 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1220 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 1220 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 608 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 608 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 608 848 nwamamassloga.scr nwamamassloga.scr PID 848 wrote to memory of 608 848 nwamamassloga.scr nwamamassloga.scr
Processes
-
C:\Users\Admin\AppData\Local\Temp\nwamamassloga.scr"C:\Users\Admin\AppData\Local\Temp\nwamamassloga.scr" /S1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\nwamamassloga.scr"C:\Users\Admin\AppData\Local\Temp\nwamamassloga.scr"2⤵
-
C:\Users\Admin\AppData\Local\Temp\nwamamassloga.scr"C:\Users\Admin\AppData\Local\Temp\nwamamassloga.scr"2⤵
-
C:\Users\Admin\AppData\Local\Temp\nwamamassloga.scr"C:\Users\Admin\AppData\Local\Temp\nwamamassloga.scr"2⤵
-
C:\Users\Admin\AppData\Local\Temp\nwamamassloga.scr"C:\Users\Admin\AppData\Local\Temp\nwamamassloga.scr"2⤵
-
C:\Users\Admin\AppData\Local\Temp\nwamamassloga.scr"C:\Users\Admin\AppData\Local\Temp\nwamamassloga.scr"2⤵