Analysis
-
max time kernel
56s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
02-05-2022 15:34
Static task
static1
Behavioral task
behavioral1
Sample
00d5e412b5291821d1d494e993d6df45002cdedb9c750e4133f73ec6a67653ee.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
00d5e412b5291821d1d494e993d6df45002cdedb9c750e4133f73ec6a67653ee.exe
Resource
win10v2004-20220414-en
General
-
Target
00d5e412b5291821d1d494e993d6df45002cdedb9c750e4133f73ec6a67653ee.exe
-
Size
3.2MB
-
MD5
92a57e8a84eb3be8af9c64753c30781b
-
SHA1
bd0717580833a366d3c2b4f8b368095714c4c98d
-
SHA256
00d5e412b5291821d1d494e993d6df45002cdedb9c750e4133f73ec6a67653ee
-
SHA512
dd3bcb529dfaab3470c62ee263cef66a3675cd3375d6f8b043b67f2a22564f86d0318c4fc79ad87e0579d2ceff93677745fecdab926141d5687ee3b5cb5753c2
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 1100 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 1100 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
00d5e412b5291821d1d494e993d6df45002cdedb9c750e4133f73ec6a67653ee.exedescription pid Process procid_target PID 1044 wrote to memory of 1100 1044 00d5e412b5291821d1d494e993d6df45002cdedb9c750e4133f73ec6a67653ee.exe 28 PID 1044 wrote to memory of 1100 1044 00d5e412b5291821d1d494e993d6df45002cdedb9c750e4133f73ec6a67653ee.exe 28 PID 1044 wrote to memory of 1100 1044 00d5e412b5291821d1d494e993d6df45002cdedb9c750e4133f73ec6a67653ee.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\00d5e412b5291821d1d494e993d6df45002cdedb9c750e4133f73ec6a67653ee.exe"C:\Users\Admin\AppData\Local\Temp\00d5e412b5291821d1d494e993d6df45002cdedb9c750e4133f73ec6a67653ee.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
\??\c:\windows\system32\WindowsPowerShell\v1.0\powershell.exe-ep bypass -noexit -f C:\Users\Admin\AppData\Local\Temp\get-points.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD54cbfa161c9ce114d4b772988ef9f8255
SHA128178e575804a3c97434bca53111cab82546be38
SHA256ef297ff9ad64d966e8c977fd8272523f69e73309ed6886b33a8e6e5801e49610
SHA512d89b9eed47c5396983a7b08999b925d105414f9d7aedbcdfb3a2f081eb7f326838a56221883ce3f68b376172c7339878f3a9b24e601cc002be7887ae91371496