Analysis
-
max time kernel
111s -
max time network
110s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
24-04-2021 08:03
Static task
static1
Behavioral task
behavioral1
Sample
53d1fe3209497d194e38201deb835924.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
53d1fe3209497d194e38201deb835924.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
53d1fe3209497d194e38201deb835924.exe
-
Size
2.1MB
-
MD5
53d1fe3209497d194e38201deb835924
-
SHA1
43f4315a82d7cd359aec38eac9fa37602d8baac6
-
SHA256
af0249150bee4fec74c124f89019cd260c9aacd7b7a7715192b5097f1948eb82
-
SHA512
a706c677811bc7b5b0368c840c00499b45c3f30e3b52350373e4475bfe90c8bfceee57100d28dece8ec3006382a0be5a8ae780e1c1d71acf43208301200128a2
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
53d1fe3209497d194e38201deb835924.exepid process 1040 53d1fe3209497d194e38201deb835924.exe 1040 53d1fe3209497d194e38201deb835924.exe 1040 53d1fe3209497d194e38201deb835924.exe 1040 53d1fe3209497d194e38201deb835924.exe 1040 53d1fe3209497d194e38201deb835924.exe 1040 53d1fe3209497d194e38201deb835924.exe 1040 53d1fe3209497d194e38201deb835924.exe 1040 53d1fe3209497d194e38201deb835924.exe 1040 53d1fe3209497d194e38201deb835924.exe 1040 53d1fe3209497d194e38201deb835924.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
53d1fe3209497d194e38201deb835924.exedescription pid process Token: SeDebugPrivilege 1040 53d1fe3209497d194e38201deb835924.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
53d1fe3209497d194e38201deb835924.exedescription pid process target process PID 1040 wrote to memory of 1060 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 1060 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 1060 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 1060 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 1352 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 1352 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 1352 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 1352 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 1232 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 1232 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 1232 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 1232 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 396 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 396 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 396 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 396 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 432 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 432 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 432 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe PID 1040 wrote to memory of 432 1040 53d1fe3209497d194e38201deb835924.exe 53d1fe3209497d194e38201deb835924.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53d1fe3209497d194e38201deb835924.exe"C:\Users\Admin\AppData\Local\Temp\53d1fe3209497d194e38201deb835924.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\53d1fe3209497d194e38201deb835924.exe"{path}"2⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\53d1fe3209497d194e38201deb835924.exe"{path}"2⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\53d1fe3209497d194e38201deb835924.exe"{path}"2⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\53d1fe3209497d194e38201deb835924.exe"{path}"2⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\53d1fe3209497d194e38201deb835924.exe"{path}"2⤵PID:432