Analysis
-
max time kernel
18s -
max time network
52s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
22-08-2021 19:36
Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
2.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
2.exe
-
Size
2.7MB
-
MD5
37798198d3649f8171286118fd320fe2
-
SHA1
e4d54a7c1dec833f20a6ff922388bac3b0a8546f
-
SHA256
04e942767c6c9744ef7eb6d3cc342239b8feaacd4df3c5e542b85177c0fbd97f
-
SHA512
04f6b778a1920686a8c831be6a827df8997c70b5f2148470142748388d8719f78c553ca462000323bc96c9dc0443addaed636687743ed6df159bab3e90e45838
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1804 2.exe 1804 2.exe 1804 2.exe 1804 2.exe 1804 2.exe 1804 2.exe 1804 2.exe 1804 2.exe 1804 2.exe 1804 2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1804 2.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1804 wrote to memory of 456 1804 2.exe 29 PID 1804 wrote to memory of 456 1804 2.exe 29 PID 1804 wrote to memory of 456 1804 2.exe 29 PID 1804 wrote to memory of 456 1804 2.exe 29 PID 1804 wrote to memory of 652 1804 2.exe 30 PID 1804 wrote to memory of 652 1804 2.exe 30 PID 1804 wrote to memory of 652 1804 2.exe 30 PID 1804 wrote to memory of 652 1804 2.exe 30 PID 1804 wrote to memory of 464 1804 2.exe 31 PID 1804 wrote to memory of 464 1804 2.exe 31 PID 1804 wrote to memory of 464 1804 2.exe 31 PID 1804 wrote to memory of 464 1804 2.exe 31 PID 1804 wrote to memory of 768 1804 2.exe 32 PID 1804 wrote to memory of 768 1804 2.exe 32 PID 1804 wrote to memory of 768 1804 2.exe 32 PID 1804 wrote to memory of 768 1804 2.exe 32 PID 1804 wrote to memory of 556 1804 2.exe 33 PID 1804 wrote to memory of 556 1804 2.exe 33 PID 1804 wrote to memory of 556 1804 2.exe 33 PID 1804 wrote to memory of 556 1804 2.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵PID:456
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵PID:652
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵PID:464
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵PID:556
-