Analysis
-
max time kernel
86s -
max time network
19s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
26-07-2021 14:49
Static task
static1
Behavioral task
behavioral1
Sample
60d92de4c9490fc49ab899cad9bb3efb.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
60d92de4c9490fc49ab899cad9bb3efb.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
60d92de4c9490fc49ab899cad9bb3efb.exe
-
Size
1.6MB
-
MD5
60d92de4c9490fc49ab899cad9bb3efb
-
SHA1
c8b3aaa04c2790d283db59b834712aef8cb17026
-
SHA256
c1aa3996fb100371e8d443417f1c90f959306af345dc4436d5382e49bb205ac7
-
SHA512
c986703bc1fd4130c3a8b4b4d8f16d998b390c0b04e628f7e9d6d8c3f378be9177de71457dd2ee09f4657d3b124e9b2b295a6f40927bc2f8692adacc42ff0b97
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
60d92de4c9490fc49ab899cad9bb3efb.exepid process 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 1944 60d92de4c9490fc49ab899cad9bb3efb.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
60d92de4c9490fc49ab899cad9bb3efb.exedescription pid process Token: SeDebugPrivilege 1944 60d92de4c9490fc49ab899cad9bb3efb.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
60d92de4c9490fc49ab899cad9bb3efb.exedescription pid process target process PID 1944 wrote to memory of 1580 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 1580 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 1580 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 1580 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 968 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 968 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 968 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 968 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 1700 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 1700 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 1700 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 1700 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 560 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 560 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 560 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 560 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 1704 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 1704 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 1704 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe PID 1944 wrote to memory of 1704 1944 60d92de4c9490fc49ab899cad9bb3efb.exe 60d92de4c9490fc49ab899cad9bb3efb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"C:\Users\Admin\AppData\Local\Temp\60d92de4c9490fc49ab899cad9bb3efb.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1944-59-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/1944-61-0x0000000004E30000-0x0000000004E31000-memory.dmpFilesize
4KB
-
memory/1944-62-0x00000000004F0000-0x000000000051D000-memory.dmpFilesize
180KB
-
memory/1944-63-0x0000000004DA0000-0x0000000004E17000-memory.dmpFilesize
476KB
-
memory/1944-64-0x0000000004D20000-0x0000000004D59000-memory.dmpFilesize
228KB