Analysis
-
max time kernel
32s -
max time network
66s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
08-09-2021 17:26
Static task
static1
Behavioral task
behavioral1
Sample
2f27554c5fbeb881bfe32ea5475befb4.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
General
-
Target
2f27554c5fbeb881bfe32ea5475befb4.exe
-
Size
5KB
-
MD5
2f27554c5fbeb881bfe32ea5475befb4
-
SHA1
48eceac335a3129cbf2bc50b9026ba3a7d4b58de
-
SHA256
62adcba42e924882bbbc57aa1a7801e7000ba3366e055beeab5d935d9f7822fc
-
SHA512
5bed056bd6dd68c45837418b461b2e88bbf70466400c55b7228275cd9552a6b8cdd446b3f469d8844a6ff9c796b9fc054b27819a77f067bba27f502038248e99
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2f27554c5fbeb881bfe32ea5475befb4.exepid process 1104 2f27554c5fbeb881bfe32ea5475befb4.exe 1104 2f27554c5fbeb881bfe32ea5475befb4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2f27554c5fbeb881bfe32ea5475befb4.exedescription pid process Token: SeDebugPrivilege 1104 2f27554c5fbeb881bfe32ea5475befb4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2f27554c5fbeb881bfe32ea5475befb4.exedescription pid process target process PID 1104 wrote to memory of 772 1104 2f27554c5fbeb881bfe32ea5475befb4.exe vbc.exe PID 1104 wrote to memory of 772 1104 2f27554c5fbeb881bfe32ea5475befb4.exe vbc.exe PID 1104 wrote to memory of 772 1104 2f27554c5fbeb881bfe32ea5475befb4.exe vbc.exe PID 1104 wrote to memory of 772 1104 2f27554c5fbeb881bfe32ea5475befb4.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f27554c5fbeb881bfe32ea5475befb4.exe"C:\Users\Admin\AppData\Local\Temp\2f27554c5fbeb881bfe32ea5475befb4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1104-60-0x0000000000DB0000-0x0000000000DB1000-memory.dmpFilesize
4KB
-
memory/1104-62-0x0000000075551000-0x0000000075553000-memory.dmpFilesize
8KB
-
memory/1104-63-0x0000000004C30000-0x0000000004C31000-memory.dmpFilesize
4KB
-
memory/1104-64-0x0000000000D50000-0x0000000000DAF000-memory.dmpFilesize
380KB
-
memory/1104-65-0x0000000000950000-0x0000000000951000-memory.dmpFilesize
4KB