Analysis
-
max time kernel
13s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
05-02-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
UIF Covid-19.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
UIF Covid-19.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
UIF Covid-19.exe
-
Size
358KB
-
MD5
3601ca92dbd87d046273d2c6aca6e7a6
-
SHA1
a37cf982bf9d242601124346d17eafea404d6b07
-
SHA256
7c66bdf5e60c828d8033218f9807b954e26046817acda2a8235a5b3bc68c5277
-
SHA512
9a0e39178a2c248a9470d6899e9fe9528531423d479d6571dd8380d1ed3f04aac596436bdcec23aa686bafba54459c889ffcc6af08d366a9d8adf442f040ba1f
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 5 IoCs
Processes:
svchost.exedescription ioc Process File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
UIF Covid-19.exepid Process 1932 UIF Covid-19.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
UIF Covid-19.exesvchost.exedescription pid Process Token: SeDebugPrivilege 1932 UIF Covid-19.exe Token: SeShutdownPrivilege 4728 svchost.exe Token: SeCreatePagefilePrivilege 4728 svchost.exe Token: SeShutdownPrivilege 4728 svchost.exe Token: SeCreatePagefilePrivilege 4728 svchost.exe Token: SeShutdownPrivilege 4728 svchost.exe Token: SeCreatePagefilePrivilege 4728 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UIF Covid-19.exe"C:\Users\Admin\AppData\Local\Temp\UIF Covid-19.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4728