Analysis
-
max time kernel
112s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 18:51
Behavioral task
behavioral1
Sample
b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe
-
Size
112KB
-
MD5
b9b5f5039c19f15ca610baa095642f8a
-
SHA1
6464f52a47c362195a219bd5cf529338bf29a5c9
-
SHA256
b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5
-
SHA512
5c62f2e948609d2481f2fd77bcee5f9a5fb93b8997ea7753c67554c3cd5c20d005b4170d498522aedd83b6c281edc8f8a60cffa75333cedc97fb06fe7451b697
Score
1/10
Malware Config
Signatures
-
Delays execution with timeout.exe 1 IoCs
pid Process 4072 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3924 powershell.exe 3924 powershell.exe 3924 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3924 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2464 wrote to memory of 3156 2464 b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe 69 PID 2464 wrote to memory of 3156 2464 b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe 69 PID 2464 wrote to memory of 3156 2464 b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe 69 PID 2464 wrote to memory of 3460 2464 b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe 70 PID 2464 wrote to memory of 3460 2464 b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe 70 PID 2464 wrote to memory of 3460 2464 b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe 70 PID 3156 wrote to memory of 4072 3156 cmd.exe 73 PID 3156 wrote to memory of 4072 3156 cmd.exe 73 PID 3156 wrote to memory of 4072 3156 cmd.exe 73 PID 3460 wrote to memory of 3924 3460 cmd.exe 74 PID 3460 wrote to memory of 3924 3460 cmd.exe 74 PID 3460 wrote to memory of 3924 3460 cmd.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe"C:\Users\Admin\AppData\Local\Temp\b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\cmd.execmd.exe /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:4072
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C PowerShell "Start-Sleep 5; Remove-Item C:\Users\Admin\AppData\Local\Temp\b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell "Start-Sleep 5; Remove-Item C:\Users\Admin\AppData\Local\Temp\b288c3b3f5886b1cd7b6600df2b8046f2c0fd17360fb188ecfbcc8f6b7e552a5.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-