Analysis
-
max time kernel
120s -
max time network
172s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-07-2021 13:31
Static task
static1
Behavioral task
behavioral1
Sample
JMIRLlEMHBPEEQvrxjqCV.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
JMIRLlEMHBPEEQvrxjqCV.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
JMIRLlEMHBPEEQvrxjqCV.exe
-
Size
215KB
-
MD5
fd759dd1bc9fd7410275b3241e033056
-
SHA1
1b54a28e2733bb327613d9b28faf52bd03cecefe
-
SHA256
0ea5f38a33714a857aa46a7dd180fd85fea2e0eb1e919671d13b2fb5cae5296e
-
SHA512
cea6f4ec2f522d3ff09b87d04aa007bed81270eb99be443e35d32a52b00f781a57594e0b9a9cb1bd3721156e3acf9c7ba9c9f3113e55aaca1997c2bbd9e41221
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
JMIRLlEMHBPEEQvrxjqCV.exepid process 1032 JMIRLlEMHBPEEQvrxjqCV.exe 1032 JMIRLlEMHBPEEQvrxjqCV.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
dw20.exepid process 1284 dw20.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
JMIRLlEMHBPEEQvrxjqCV.exedescription pid process Token: SeDebugPrivilege 1032 JMIRLlEMHBPEEQvrxjqCV.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
JMIRLlEMHBPEEQvrxjqCV.exedescription pid process target process PID 1032 wrote to memory of 1284 1032 JMIRLlEMHBPEEQvrxjqCV.exe dw20.exe PID 1032 wrote to memory of 1284 1032 JMIRLlEMHBPEEQvrxjqCV.exe dw20.exe PID 1032 wrote to memory of 1284 1032 JMIRLlEMHBPEEQvrxjqCV.exe dw20.exe PID 1032 wrote to memory of 1284 1032 JMIRLlEMHBPEEQvrxjqCV.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JMIRLlEMHBPEEQvrxjqCV.exe"C:\Users\Admin\AppData\Local\Temp\JMIRLlEMHBPEEQvrxjqCV.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 5162⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1284
-