Analysis
-
max time kernel
13s -
max time network
116s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
16-02-2021 17:42
Static task
static1
Behavioral task
behavioral1
Sample
01a083f4_extracted.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
01a083f4_extracted.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
01a083f4_extracted.exe
-
Size
146KB
-
MD5
c5c6f5d743b1d2391b150c9740db22ba
-
SHA1
f033a2fab1ad3a6e8d4ab08730654fc6f3482a4e
-
SHA256
b2ffebf2df5b70d6866b2bb65a56ecafa59371fc78f3690790bb273c715df683
-
SHA512
6bf5d23f2f82b02dd194716d747b99858823915fccb09b39a842f5a221b2d933e8c53d0158fe4806bde644f96aa9d28699ec4ab702d71e55d93feb0f384f843e
Score
1/10
Malware Config
Signatures
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 188 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
01a083f4_extracted.exetaskkill.exedescription pid process Token: SeDebugPrivilege 984 01a083f4_extracted.exe Token: SeDebugPrivilege 188 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
01a083f4_extracted.execmd.exedescription pid process target process PID 984 wrote to memory of 4092 984 01a083f4_extracted.exe cmd.exe PID 984 wrote to memory of 4092 984 01a083f4_extracted.exe cmd.exe PID 984 wrote to memory of 4092 984 01a083f4_extracted.exe cmd.exe PID 4092 wrote to memory of 188 4092 cmd.exe taskkill.exe PID 4092 wrote to memory of 188 4092 cmd.exe taskkill.exe PID 4092 wrote to memory of 188 4092 cmd.exe taskkill.exe PID 4092 wrote to memory of 748 4092 cmd.exe choice.exe PID 4092 wrote to memory of 748 4092 cmd.exe choice.exe PID 4092 wrote to memory of 748 4092 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01a083f4_extracted.exe"C:\Users\Admin\AppData\Local\Temp\01a083f4_extracted.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 984 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\01a083f4_extracted.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 9843⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:188 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:748