Analysis
-
max time kernel
62s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
05-03-2021 14:33
Static task
static1
Behavioral task
behavioral1
Sample
fcc595f22b212b4e0cce8a9ac0849fea.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
fcc595f22b212b4e0cce8a9ac0849fea.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
fcc595f22b212b4e0cce8a9ac0849fea.exe
-
Size
377KB
-
MD5
fcc595f22b212b4e0cce8a9ac0849fea
-
SHA1
6aa5c48c9bd9794b35d42e1a5053fccbb4a4823a
-
SHA256
a4ab08ff70e6117f5ca89a99fa94d63ba3468a7c97e2efc4d8ed6c634bb97671
-
SHA512
715ca8e30229c0f9f21427a253a9803ea85f6ba049ab7936816d9cf7c4a559691075ba918278ecf0ea8944c7e11c710ef87fd729c5ac265cb67fddab52e1bfee
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exepid process 3872 powershell.exe 3872 powershell.exe 3872 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3872 powershell.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
Processes:
fcc595f22b212b4e0cce8a9ac0849fea.exepid process 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe -
Suspicious use of SendNotifyMessage 16 IoCs
Processes:
fcc595f22b212b4e0cce8a9ac0849fea.exepid process 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe 988 fcc595f22b212b4e0cce8a9ac0849fea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
fcc595f22b212b4e0cce8a9ac0849fea.exedescription pid process target process PID 988 wrote to memory of 3872 988 fcc595f22b212b4e0cce8a9ac0849fea.exe powershell.exe PID 988 wrote to memory of 3872 988 fcc595f22b212b4e0cce8a9ac0849fea.exe powershell.exe PID 988 wrote to memory of 3872 988 fcc595f22b212b4e0cce8a9ac0849fea.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcc595f22b212b4e0cce8a9ac0849fea.exe"C:\Users\Admin\AppData\Local\Temp\fcc595f22b212b4e0cce8a9ac0849fea.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -executionpolicy bypass C:\Users\Admin\AppData\Roaming\ykZORLMXT.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3872-2-0x0000000000000000-mapping.dmp
-
memory/3872-3-0x0000000072960000-0x000000007304E000-memory.dmpFilesize
6.9MB
-
memory/3872-4-0x0000000006BE0000-0x0000000006BE1000-memory.dmpFilesize
4KB
-
memory/3872-5-0x0000000007380000-0x0000000007381000-memory.dmpFilesize
4KB
-
memory/3872-6-0x00000000072D0000-0x00000000072D1000-memory.dmpFilesize
4KB
-
memory/3872-7-0x0000000007B90000-0x0000000007B91000-memory.dmpFilesize
4KB
-
memory/3872-8-0x0000000007C70000-0x0000000007C71000-memory.dmpFilesize
4KB
-
memory/3872-9-0x0000000007CE0000-0x0000000007CE1000-memory.dmpFilesize
4KB
-
memory/3872-10-0x0000000006D40000-0x0000000006D41000-memory.dmpFilesize
4KB
-
memory/3872-11-0x0000000006D42000-0x0000000006D43000-memory.dmpFilesize
4KB
-
memory/3872-12-0x0000000007A70000-0x0000000007A71000-memory.dmpFilesize
4KB
-
memory/3872-13-0x00000000080F0000-0x00000000080F1000-memory.dmpFilesize
4KB
-
memory/3872-14-0x00000000083C0000-0x00000000083C1000-memory.dmpFilesize
4KB
-
memory/3872-15-0x0000000006D43000-0x0000000006D44000-memory.dmpFilesize
4KB