Analysis
-
max time kernel
122s -
max time network
121s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 15:04
Static task
static1
Behavioral task
behavioral1
Sample
insz.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
insz.exe
-
Size
209KB
-
MD5
394f9f303f2a0039f204a23c0a5ad1a7
-
SHA1
a84f6b731446c79f491292a46133087825cdc0ca
-
SHA256
ca035ce2804aff96e07142ecb344766e2fca568af3b5b01f60d7886225d7cd49
-
SHA512
ca16a81380c60f0e705e089bfaed815b0a050b4bbadbea1a54332f816a4cfb5535d86f86c93a865d84747e7a32c73193658b6ea5ec72d44cf915b519f6f9af21
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
insz.exedescription pid process target process PID 1676 set thread context of 1352 1676 insz.exe insz.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1424 1352 WerFault.exe insz.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1424 WerFault.exe 1424 WerFault.exe 1424 WerFault.exe 1424 WerFault.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
insz.exepid process 1676 insz.exe 1676 insz.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1424 WerFault.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
insz.exeinsz.exedescription pid process target process PID 1676 wrote to memory of 1352 1676 insz.exe insz.exe PID 1676 wrote to memory of 1352 1676 insz.exe insz.exe PID 1676 wrote to memory of 1352 1676 insz.exe insz.exe PID 1676 wrote to memory of 1352 1676 insz.exe insz.exe PID 1676 wrote to memory of 1352 1676 insz.exe insz.exe PID 1352 wrote to memory of 1424 1352 insz.exe WerFault.exe PID 1352 wrote to memory of 1424 1352 insz.exe WerFault.exe PID 1352 wrote to memory of 1424 1352 insz.exe WerFault.exe PID 1352 wrote to memory of 1424 1352 insz.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\insz.exe"C:\Users\Admin\AppData\Local\Temp\insz.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\insz.exe"C:\Users\Admin\AppData\Local\Temp\insz.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 363⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424