Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 21:10
Behavioral task
behavioral1
Sample
e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe
-
Size
5.5MB
-
MD5
dbe95482a73c63d5b3d1d16aa3ad8f21
-
SHA1
4bba60ff11f8b150b004960c658ad74a707ebcea
-
SHA256
e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470
-
SHA512
2f6795a956873a35cc14949f707b51438579fd08cc02e05b17e69628b20d9207863bbc443b670464cbe052a620ecc7bb350e53d9cde5cabbeb266eea049cc3ed
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1928 cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\netkmssg.dll e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 284 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 576 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 576 powershell.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1928 1276 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 27 PID 1276 wrote to memory of 1928 1276 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 27 PID 1276 wrote to memory of 1928 1276 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 27 PID 1276 wrote to memory of 1928 1276 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 27 PID 1276 wrote to memory of 1656 1276 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 28 PID 1276 wrote to memory of 1656 1276 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 28 PID 1276 wrote to memory of 1656 1276 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 28 PID 1276 wrote to memory of 1656 1276 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 28 PID 1656 wrote to memory of 576 1656 cmd.exe 32 PID 1656 wrote to memory of 576 1656 cmd.exe 32 PID 1656 wrote to memory of 576 1656 cmd.exe 32 PID 1656 wrote to memory of 576 1656 cmd.exe 32 PID 1928 wrote to memory of 284 1928 cmd.exe 31 PID 1928 wrote to memory of 284 1928 cmd.exe 31 PID 1928 wrote to memory of 284 1928 cmd.exe 31 PID 1928 wrote to memory of 284 1928 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe"C:\Users\Admin\AppData\Local\Temp\e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\cmd.execmd.exe /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:284
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C PowerShell "Start-Sleep 5; Remove-Item C:\Users\Admin\AppData\Local\Temp\e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell "Start-Sleep 5; Remove-Item C:\Users\Admin\AppData\Local\Temp\e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-