Analysis
-
max time kernel
55s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 04:06
Static task
static1
Behavioral task
behavioral1
Sample
Quote USD$ Prices For Items.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Quote USD$ Prices For Items.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
Quote USD$ Prices For Items.exe
-
Size
926KB
-
MD5
50831e895c50a7c21c1be66fc6fd2d28
-
SHA1
39cf19b2c753254ed0bafa11c635ab07670db32c
-
SHA256
490ba5c3e2409bf961484b16cba91c2539609bb04b10c69d0a2e5c76889242bf
-
SHA512
898a492001724bf52cee0fdee167da15447395424333eb5f9fe28355929207dd9d375743c80d0d259bee8bf8a2abe24effb677e0f0b8210a8f742a9e318c62ea
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Quote USD$ Prices For Items.exepid process 1436 Quote USD$ Prices For Items.exe 1436 Quote USD$ Prices For Items.exe 1436 Quote USD$ Prices For Items.exe 1436 Quote USD$ Prices For Items.exe 1436 Quote USD$ Prices For Items.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Quote USD$ Prices For Items.exedescription pid process Token: SeDebugPrivilege 1436 Quote USD$ Prices For Items.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
Quote USD$ Prices For Items.exedescription pid process target process PID 1436 wrote to memory of 1004 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 1004 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 1004 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 1004 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 740 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 740 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 740 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 740 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 640 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 640 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 640 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 640 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 1728 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 1728 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 1728 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 1728 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 112 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 112 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 112 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe PID 1436 wrote to memory of 112 1436 Quote USD$ Prices For Items.exe Quote USD$ Prices For Items.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Quote USD$ Prices For Items.exe"C:\Users\Admin\AppData\Local\Temp\Quote USD$ Prices For Items.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Quote USD$ Prices For Items.exe"C:\Users\Admin\AppData\Local\Temp\Quote USD$ Prices For Items.exe"2⤵PID:1004
-
-
C:\Users\Admin\AppData\Local\Temp\Quote USD$ Prices For Items.exe"C:\Users\Admin\AppData\Local\Temp\Quote USD$ Prices For Items.exe"2⤵PID:740
-
-
C:\Users\Admin\AppData\Local\Temp\Quote USD$ Prices For Items.exe"C:\Users\Admin\AppData\Local\Temp\Quote USD$ Prices For Items.exe"2⤵PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\Quote USD$ Prices For Items.exe"C:\Users\Admin\AppData\Local\Temp\Quote USD$ Prices For Items.exe"2⤵PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\Quote USD$ Prices For Items.exe"C:\Users\Admin\AppData\Local\Temp\Quote USD$ Prices For Items.exe"2⤵PID:112
-