Analysis
-
max time kernel
61s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 00:10
Static task
static1
Behavioral task
behavioral1
Sample
f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe
-
Size
207KB
-
MD5
0d194b223e038d4c652484549f613763
-
SHA1
19d367df7f0c3530c6650fe6355e3d9da3378419
-
SHA256
f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605
-
SHA512
e9de3df5f2aaa2e1ea576ad5f3a0e0dc27ce4fd9837c2a5505f54122f20ec0b0bafe0a9f54dd02f8e9cc40664eb54ee2d85634483d60ddf8e352c89de3d70a51
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5068 f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe 5068 f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe 5068 f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe 5068 f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5068 f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5068 wrote to memory of 2352 5068 f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe 21 PID 5068 wrote to memory of 2360 5068 f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe 22 PID 5068 wrote to memory of 2452 5068 f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe 23 PID 5068 wrote to memory of 2912 5068 f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe 53 PID 5068 wrote to memory of 3276 5068 f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe 52
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2360
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2452
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe"C:\Users\Admin\AppData\Local\Temp\f871e78adf4f918eed72ba7938c010f74197504f0a04febdb35a9f4f10c49605.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068