Analysis
-
max time kernel
29s -
max time network
38s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
03-06-2021 12:48
Static task
static1
Behavioral task
behavioral1
Sample
0b4ab2b8547d9d49b35788f9da74b439.exe
Resource
win7v20210408
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
0b4ab2b8547d9d49b35788f9da74b439.exe
Resource
win10v20210410
0 signatures
0 seconds
General
-
Target
0b4ab2b8547d9d49b35788f9da74b439.exe
-
Size
4.9MB
-
MD5
0b4ab2b8547d9d49b35788f9da74b439
-
SHA1
7452326f93c8dc33695dee74e092aabcac462f3b
-
SHA256
60e93179fdc24865d5d06c00a6280a224263def03b1d9b081b0edf972ed95ad1
-
SHA512
89d6ca06231f9b9534d6938e1f698c06ee3ab594351940e2e5ec6b1a8079426bbccf20474a9808848885705627a80cf0511df76e4c5c0b8f56f2a09df3e9bb46
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\InstallAgent = "\"C:\\Users\\Admin\\AppData\\Roaming\\InstallAgent\\InstallAgent.exe\"" 0b4ab2b8547d9d49b35788f9da74b439.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1204 set thread context of 548 1204 0b4ab2b8547d9d49b35788f9da74b439.exe 30 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1204 0b4ab2b8547d9d49b35788f9da74b439.exe 1204 0b4ab2b8547d9d49b35788f9da74b439.exe 1204 0b4ab2b8547d9d49b35788f9da74b439.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1204 0b4ab2b8547d9d49b35788f9da74b439.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1204 wrote to memory of 548 1204 0b4ab2b8547d9d49b35788f9da74b439.exe 30 PID 1204 wrote to memory of 548 1204 0b4ab2b8547d9d49b35788f9da74b439.exe 30 PID 1204 wrote to memory of 548 1204 0b4ab2b8547d9d49b35788f9da74b439.exe 30 PID 1204 wrote to memory of 548 1204 0b4ab2b8547d9d49b35788f9da74b439.exe 30 PID 1204 wrote to memory of 548 1204 0b4ab2b8547d9d49b35788f9da74b439.exe 30 PID 1204 wrote to memory of 548 1204 0b4ab2b8547d9d49b35788f9da74b439.exe 30 PID 1204 wrote to memory of 548 1204 0b4ab2b8547d9d49b35788f9da74b439.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b4ab2b8547d9d49b35788f9da74b439.exe"C:\Users\Admin\AppData\Local\Temp\0b4ab2b8547d9d49b35788f9da74b439.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\0b4ab2b8547d9d49b35788f9da74b439.exeC:\Users\Admin\AppData\Local\Temp\0b4ab2b8547d9d49b35788f9da74b439.exe2⤵PID:548
-