Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
20-04-2021 18:22
Static task
static1
Behavioral task
behavioral1
Sample
comparendopicoycedula365215999runtcomco.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
comparendopicoycedula365215999runtcomco.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
comparendopicoycedula365215999runtcomco.exe
-
Size
2.3MB
-
MD5
44bc0732e9c6deb1f912ddbd055efac3
-
SHA1
99f1c521d68f068c735c842504f01f5678ddb157
-
SHA256
368e9e3d450bae08f20e5ab0937dcd47a03835daabe900ddf87c746fb99a50fb
-
SHA512
a4a7077d06b2c1059c48abb2ea9ce1c669214e4621e3bf9cfc35b67a4411a22d60d4019588c47e0b9a2b3d2d5e06a427417598cd5183a9a8be0bb33a227d7d2a
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1324-65-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/1324-68-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
comparendopicoycedula365215999runtcomco.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\antimalawareserviceexecutablee = "C:\\Users\\Admin\\AppData\\Local\\windowsdefenderlogsini\\antimalawareserviceexecutablee.exe" comparendopicoycedula365215999runtcomco.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
comparendopicoycedula365215999runtcomco.exepid process 1324 comparendopicoycedula365215999runtcomco.exe 1324 comparendopicoycedula365215999runtcomco.exe 1324 comparendopicoycedula365215999runtcomco.exe 1324 comparendopicoycedula365215999runtcomco.exe 1324 comparendopicoycedula365215999runtcomco.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
comparendopicoycedula365215999runtcomco.exedescription pid process target process PID 756 set thread context of 1324 756 comparendopicoycedula365215999runtcomco.exe comparendopicoycedula365215999runtcomco.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
comparendopicoycedula365215999runtcomco.exepid process 756 comparendopicoycedula365215999runtcomco.exe 756 comparendopicoycedula365215999runtcomco.exe -
Suspicious behavior: RenamesItself 7 IoCs
Processes:
comparendopicoycedula365215999runtcomco.exepid process 1324 comparendopicoycedula365215999runtcomco.exe 1324 comparendopicoycedula365215999runtcomco.exe 1324 comparendopicoycedula365215999runtcomco.exe 1324 comparendopicoycedula365215999runtcomco.exe 1324 comparendopicoycedula365215999runtcomco.exe 1324 comparendopicoycedula365215999runtcomco.exe 1324 comparendopicoycedula365215999runtcomco.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
comparendopicoycedula365215999runtcomco.execomparendopicoycedula365215999runtcomco.exedescription pid process Token: SeDebugPrivilege 756 comparendopicoycedula365215999runtcomco.exe Token: SeDebugPrivilege 1324 comparendopicoycedula365215999runtcomco.exe Token: SeShutdownPrivilege 1324 comparendopicoycedula365215999runtcomco.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
comparendopicoycedula365215999runtcomco.exepid process 1324 comparendopicoycedula365215999runtcomco.exe 1324 comparendopicoycedula365215999runtcomco.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
comparendopicoycedula365215999runtcomco.exedescription pid process target process PID 756 wrote to memory of 1324 756 comparendopicoycedula365215999runtcomco.exe comparendopicoycedula365215999runtcomco.exe PID 756 wrote to memory of 1324 756 comparendopicoycedula365215999runtcomco.exe comparendopicoycedula365215999runtcomco.exe PID 756 wrote to memory of 1324 756 comparendopicoycedula365215999runtcomco.exe comparendopicoycedula365215999runtcomco.exe PID 756 wrote to memory of 1324 756 comparendopicoycedula365215999runtcomco.exe comparendopicoycedula365215999runtcomco.exe PID 756 wrote to memory of 1324 756 comparendopicoycedula365215999runtcomco.exe comparendopicoycedula365215999runtcomco.exe PID 756 wrote to memory of 1324 756 comparendopicoycedula365215999runtcomco.exe comparendopicoycedula365215999runtcomco.exe PID 756 wrote to memory of 1324 756 comparendopicoycedula365215999runtcomco.exe comparendopicoycedula365215999runtcomco.exe PID 756 wrote to memory of 1324 756 comparendopicoycedula365215999runtcomco.exe comparendopicoycedula365215999runtcomco.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\comparendopicoycedula365215999runtcomco.exe"C:\Users\Admin\AppData\Local\Temp\comparendopicoycedula365215999runtcomco.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\comparendopicoycedula365215999runtcomco.exe"C:\Users\Admin\AppData\Local\Temp\comparendopicoycedula365215999runtcomco.exe"2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1324
-