Analysis
-
max time kernel
9s -
max time network
41s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
26-07-2021 12:42
Behavioral task
behavioral1
Sample
36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
Errors
Reason
Remote task has failed: Machine shutdown
General
-
Target
36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe
-
Size
4.2MB
-
MD5
32de66a467db22cf0f5b65d1a9f4e19c
-
SHA1
cdb5c200cba7da3f6e80e868ef7df380ac1259c2
-
SHA256
36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4
-
SHA512
af200cc334c05e5fe0df1d4c76b5ce469d034c0d62288d207b6bb6562579e07dc4510e4bfc4b726cf1a9f82ae8cb69c4630e981f23d05fb85e3be842a34244f1
Score
9/10
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
shutdown.exeshutdown.exeshutdown.exeshutdown.exedescription pid process Token: SeShutdownPrivilege 1944 shutdown.exe Token: SeRemoteShutdownPrivilege 1944 shutdown.exe Token: SeShutdownPrivilege 1028 shutdown.exe Token: SeRemoteShutdownPrivilege 1028 shutdown.exe Token: SeShutdownPrivilege 1872 shutdown.exe Token: SeRemoteShutdownPrivilege 1872 shutdown.exe Token: SeShutdownPrivilege 1864 shutdown.exe Token: SeRemoteShutdownPrivilege 1864 shutdown.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exedescription pid process target process PID 1104 wrote to memory of 1988 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe bcdedit.exe PID 1104 wrote to memory of 1988 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe bcdedit.exe PID 1104 wrote to memory of 1988 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe bcdedit.exe PID 1104 wrote to memory of 1988 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe bcdedit.exe PID 1104 wrote to memory of 1028 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1028 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1028 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1028 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1944 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1944 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1944 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1944 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1872 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1872 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1872 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1872 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1864 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1864 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1864 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe PID 1104 wrote to memory of 1864 1104 36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe shutdown.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe"C:\Users\Admin\AppData\Local\Temp\36a4311ef332b0b5db62f8fcabf004fdcfbbde62f791839a8be0314604d814c4.sample.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
\??\c:\windows\system32\bcdedit.exec:\windows\Sysnative\bcdedit.exe /set {current} safeboot minimal2⤵
- Modifies boot configuration data using bcdedit
PID:1988
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /r /f /t 002⤵
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
\??\c:\windows\SysWOW64\shutdown.exec:\windows\SysWOW64\shutdown.exe /r /f /t 002⤵
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
\??\c:\windows\SysWOW64\shutdown.exec:\windows\System32\shutdown.exe /r /f /t 002⤵
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
\??\c:\windows\system32\shutdown.exec:\windows\Sysnative\shutdown.exe /r /f /t 002⤵
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:876
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1512