Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
19-04-2021 08:56
Static task
static1
Behavioral task
behavioral1
Sample
2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exe
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exedescription ioc process File created C:\Windows\Tasks\wow64.job 2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exe File opened for modification C:\Windows\Tasks\wow64.job 2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 1444 wrote to memory of 1324 1444 taskeng.exe 2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exe PID 1444 wrote to memory of 1324 1444 taskeng.exe 2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exe PID 1444 wrote to memory of 1324 1444 taskeng.exe 2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exe PID 1444 wrote to memory of 1324 1444 taskeng.exe 2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exe"C:\Users\Admin\AppData\Local\Temp\2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exe"1⤵
- Drops file in Windows directory
PID:792
-
C:\Windows\system32\taskeng.exetaskeng.exe {4BB3DB42-A48A-4D6D-AD08-2F841C84ACA5} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exeC:\Users\Admin\AppData\Local\Temp\2f90da6517ba31d42cd907480ded408e711761fb727c89baef821e040485365a.exe start2⤵PID:1324
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1012