Analysis
-
max time kernel
23s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
20-02-2022 00:25
Static task
static1
Behavioral task
behavioral1
Sample
f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exe
Resource
win10v2004-en-20220113
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exe
-
Size
170KB
-
MD5
f5610fcafb7d2494e82162441c7f6a8d
-
SHA1
0055267123ac2c5e9d2c604c88f4a157e2cdd5e4
-
SHA256
f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e
-
SHA512
b523ecc1110d263391d123c54976f1067e539459443e7d0ac74de518188da49b9a53ee6af88516e01da18e3448d5ff12442fbd87a55c25b32cb59a4ad6c79302
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exepid process 2572 f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exe 2572 f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exedescription pid process Token: SeDebugPrivilege 2572 f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exedescription pid process target process PID 2572 wrote to memory of 2280 2572 f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exe sihost.exe PID 2572 wrote to memory of 2336 2572 f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exe svchost.exe PID 2572 wrote to memory of 2436 2572 f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exe taskhostw.exe PID 2572 wrote to memory of 3160 2572 f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exe svchost.exe PID 2572 wrote to memory of 3368 2572 f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exe DllHost.exe
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3368
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3160
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2336
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exe"C:\Users\Admin\AppData\Local\Temp\f23253188e74e1372f71d28b2dbbea261f28221be6c80fadbde180890c0eac6e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572