Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 21:10
Behavioral task
behavioral1
Sample
e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe
-
Size
5.5MB
-
MD5
dbe95482a73c63d5b3d1d16aa3ad8f21
-
SHA1
4bba60ff11f8b150b004960c658ad74a707ebcea
-
SHA256
e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470
-
SHA512
2f6795a956873a35cc14949f707b51438579fd08cc02e05b17e69628b20d9207863bbc443b670464cbe052a620ecc7bb350e53d9cde5cabbeb266eea049cc3ed
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\netpahna.dll e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4060 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4080 powershell.exe 4080 powershell.exe 4080 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4080 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2272 wrote to memory of 3060 2272 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 68 PID 2272 wrote to memory of 3060 2272 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 68 PID 2272 wrote to memory of 3060 2272 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 68 PID 2272 wrote to memory of 3040 2272 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 69 PID 2272 wrote to memory of 3040 2272 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 69 PID 2272 wrote to memory of 3040 2272 e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe 69 PID 3060 wrote to memory of 4060 3060 cmd.exe 72 PID 3060 wrote to memory of 4060 3060 cmd.exe 72 PID 3060 wrote to memory of 4060 3060 cmd.exe 72 PID 3040 wrote to memory of 4080 3040 cmd.exe 73 PID 3040 wrote to memory of 4080 3040 cmd.exe 73 PID 3040 wrote to memory of 4080 3040 cmd.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe"C:\Users\Admin\AppData\Local\Temp\e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd.exe /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
PID:4060
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /C PowerShell "Start-Sleep 5; Remove-Item C:\Users\Admin\AppData\Local\Temp\e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowerShell "Start-Sleep 5; Remove-Item C:\Users\Admin\AppData\Local\Temp\e6d65e21a5b9e73a5626a2fdc9dbdd3f9ffad1f1d56f9bcd62455f6391e8b470.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-