Resubmissions
15-09-2021 06:42
210915-hgtlhadaer 1014-09-2021 08:06
210914-jzwz1sacfj 1010-09-2021 11:57
210910-n4w8ssdbdp 1008-09-2021 11:10
210908-m965hshefk 10Analysis
-
max time kernel
26s -
max time network
26s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
15-09-2021 06:42
Static task
static1
Behavioral task
behavioral1
Sample
championship.inf.dll
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
championship.inf.dll
Resource
win10-en
windows10_x64
0 signatures
0 seconds
General
-
Target
championship.inf.dll
-
Size
2.0MB
-
MD5
0b7da6388091ff9d696a18c95d41b587
-
SHA1
6c10d7d88606ac1afd30b4e61bf232329a276cdc
-
SHA256
6eedf45cb91f6762de4e35e36bcb03e5ad60ce9ac5a08caeb7eda035cd74762b
-
SHA512
45b26e8f9885dca6f4e1984fc39cb4c2a5b5988c970f35dde987b7a5a8417acbe5e972a6602071e903425f91a9095c7c289e574c3bad3039324185ad85d06a9a
Score
10/10
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 1452 wabmig.exe 29 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1592 1452 powershell.exe 29 -
Deletes itself 1 IoCs
pid Process 1592 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1612 rundll32.exe 1592 powershell.exe 1592 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1612 rundll32.exe Token: SeDebugPrivilege 1592 powershell.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1664 1612 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\championship.inf.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612
-
C:\Program Files\Windows Mail\wabmig.exe"C:\Program Files\Windows Mail\wabmig.exe"1⤵
- Process spawned unexpected child process
PID:1664
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c "Sleep 5 ; Remove-Item -Path "C:\Users\Admin\AppData\Local\Temp\championship.inf.dll" -Force1⤵
- Process spawned unexpected child process
- Deletes itself
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592