Analysis
-
max time kernel
127s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 23:04
Static task
static1
Behavioral task
behavioral1
Sample
da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe
-
Size
2.4MB
-
MD5
2a259d09d59c56d15b9104cb7576b4d8
-
SHA1
2a23f228bbeb2fb062e4ff7ff5bbca841e51ac4a
-
SHA256
da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f
-
SHA512
06729b4a11fe0c52b13f1379ba5457e502c4f7568f0d2ee789b18f1774128fd6e0959cf1c427899440d4c9fc4245098d88d246f8f4ead6d766e52a5c3cae830e
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exepid process 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exedescription pid process Token: SeDebugPrivilege 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exedescription pid process target process PID 1396 wrote to memory of 1812 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 1812 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 1812 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 1812 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 1076 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 1076 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 1076 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 1076 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 768 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 768 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 768 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 768 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 396 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 396 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 396 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 396 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 812 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 812 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 812 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe PID 1396 wrote to memory of 812 1396 da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe"C:\Users\Admin\AppData\Local\Temp\da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe"C:\Users\Admin\AppData\Local\Temp\da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe"C:\Users\Admin\AppData\Local\Temp\da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe"C:\Users\Admin\AppData\Local\Temp\da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe"C:\Users\Admin\AppData\Local\Temp\da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe"C:\Users\Admin\AppData\Local\Temp\da7da0fa7704b3dedbbd6f3b50984a6237f613131384fc682e62b228937b6a0f.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1396-54-0x0000000000210000-0x000000000047A000-memory.dmpFilesize
2.4MB
-
memory/1396-55-0x0000000075D61000-0x0000000075D63000-memory.dmpFilesize
8KB
-
memory/1396-56-0x0000000002090000-0x0000000002091000-memory.dmpFilesize
4KB
-
memory/1396-57-0x00000000005A0000-0x00000000005AA000-memory.dmpFilesize
40KB
-
memory/1396-58-0x00000000055E0000-0x00000000057CC000-memory.dmpFilesize
1.9MB
-
memory/1396-59-0x0000000008B80000-0x0000000008D1C000-memory.dmpFilesize
1.6MB