Analysis
-
max time kernel
52s -
max time network
42s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
27-07-2021 19:59
Static task
static1
Behavioral task
behavioral1
Sample
367006.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
367006.exe
-
Size
1.0MB
-
MD5
54cd3832c1ab9889d0b3741292a0263b
-
SHA1
c855ad13ab4cd135d1e04c10524a4f06a2007654
-
SHA256
e3a371bfc3dd3560f5bd27f023c137e5b2c7bdba80c5b7f14a69f393cbce047e
-
SHA512
85223e48449c77d8a36a820bb9df9c546ad0c13f9b35c8c542104dd62de557f611bf23e187245b50995481a7e175a96978dea4c0c6fc3b8461f1f07c4111c9a8
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
367006.exepid process 1700 367006.exe 1700 367006.exe 1700 367006.exe 1700 367006.exe 1700 367006.exe 1700 367006.exe 1700 367006.exe 1700 367006.exe 1700 367006.exe 1700 367006.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
367006.exedescription pid process Token: SeDebugPrivilege 1700 367006.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
367006.exedescription pid process target process PID 1700 wrote to memory of 520 1700 367006.exe 367006.exe PID 1700 wrote to memory of 520 1700 367006.exe 367006.exe PID 1700 wrote to memory of 520 1700 367006.exe 367006.exe PID 1700 wrote to memory of 520 1700 367006.exe 367006.exe PID 1700 wrote to memory of 656 1700 367006.exe 367006.exe PID 1700 wrote to memory of 656 1700 367006.exe 367006.exe PID 1700 wrote to memory of 656 1700 367006.exe 367006.exe PID 1700 wrote to memory of 656 1700 367006.exe 367006.exe PID 1700 wrote to memory of 468 1700 367006.exe 367006.exe PID 1700 wrote to memory of 468 1700 367006.exe 367006.exe PID 1700 wrote to memory of 468 1700 367006.exe 367006.exe PID 1700 wrote to memory of 468 1700 367006.exe 367006.exe PID 1700 wrote to memory of 1052 1700 367006.exe 367006.exe PID 1700 wrote to memory of 1052 1700 367006.exe 367006.exe PID 1700 wrote to memory of 1052 1700 367006.exe 367006.exe PID 1700 wrote to memory of 1052 1700 367006.exe 367006.exe PID 1700 wrote to memory of 536 1700 367006.exe 367006.exe PID 1700 wrote to memory of 536 1700 367006.exe 367006.exe PID 1700 wrote to memory of 536 1700 367006.exe 367006.exe PID 1700 wrote to memory of 536 1700 367006.exe 367006.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\367006.exe"C:\Users\Admin\AppData\Local\Temp\367006.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\367006.exe"C:\Users\Admin\AppData\Local\Temp\367006.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\367006.exe"C:\Users\Admin\AppData\Local\Temp\367006.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\367006.exe"C:\Users\Admin\AppData\Local\Temp\367006.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\367006.exe"C:\Users\Admin\AppData\Local\Temp\367006.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\367006.exe"C:\Users\Admin\AppData\Local\Temp\367006.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1700-60-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/1700-62-0x0000000004BF0000-0x0000000004BF1000-memory.dmpFilesize
4KB
-
memory/1700-63-0x0000000000270000-0x000000000028B000-memory.dmpFilesize
108KB
-
memory/1700-64-0x0000000007E40000-0x0000000007EB2000-memory.dmpFilesize
456KB
-
memory/1700-65-0x0000000002070000-0x000000000209E000-memory.dmpFilesize
184KB