Analysis
-
max time kernel
308s -
max time network
541s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
07-09-2021 21:54
Static task
static1
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
test.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
test.exe
-
Size
122KB
-
MD5
8caff4cc2912c52106d9056a7db5eb2d
-
SHA1
eee8742ac37e85e9c9b8a1d22477f080485ad9f9
-
SHA256
cfc5adfc61d1f34802ac65a474ace9ffe5007f859b2062b2297a1f047da96bda
-
SHA512
d3ba58afa9dc30ef354dd6e126092b5e0ea33e753c0d081a2895054446b5e9b28d5a7efdcc2c80be47b4deaf5bf3a7c5de6f985abd55d98e048d674b0444b63f
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 2524 created 1400 2524 svchost.exe test.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
test.exepid process 1400 test.exe 1400 test.exe 1400 test.exe 1400 test.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
svchost.exedescription pid process Token: SeTcbPrivilege 2524 svchost.exe Token: SeTcbPrivilege 2524 svchost.exe Token: SeBackupPrivilege 2524 svchost.exe Token: SeRestorePrivilege 2524 svchost.exe Token: SeBackupPrivilege 2524 svchost.exe Token: SeRestorePrivilege 2524 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
svchost.exedescription pid process target process PID 2524 wrote to memory of 2708 2524 svchost.exe test.exe PID 2524 wrote to memory of 2708 2524 svchost.exe test.exe PID 2524 wrote to memory of 2708 2524 svchost.exe test.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe" /normal.priviledge2⤵PID:2708
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524