Analysis
-
max time kernel
178s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-05-2022 20:15
Static task
static1
Behavioral task
behavioral1
Sample
36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exe
-
Size
790KB
-
MD5
c31ef7aefa08862def40cd90a0197e83
-
SHA1
954a3553f9a2e59edc2d818fe6676cfb9053fbf4
-
SHA256
36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31
-
SHA512
657dd644c3cb15bbe0ca3dcefa8265e4dadf28b4ccda4421ed4c946535882732f79c6f18727af6911320ee110c6e56615e90fa355cfd2e1b94de7773031400d0
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exedescription pid process target process PID 4192 set thread context of 4752 4192 36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 652 powershell.exe 652 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exepid process 4192 36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 652 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exeRegAsm.execmd.exedescription pid process target process PID 4192 wrote to memory of 4752 4192 36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exe RegAsm.exe PID 4192 wrote to memory of 4752 4192 36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exe RegAsm.exe PID 4192 wrote to memory of 4752 4192 36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exe RegAsm.exe PID 4192 wrote to memory of 4752 4192 36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exe RegAsm.exe PID 4752 wrote to memory of 1572 4752 RegAsm.exe cmd.exe PID 4752 wrote to memory of 1572 4752 RegAsm.exe cmd.exe PID 4752 wrote to memory of 1572 4752 RegAsm.exe cmd.exe PID 1572 wrote to memory of 652 1572 cmd.exe powershell.exe PID 1572 wrote to memory of 652 1572 cmd.exe powershell.exe PID 1572 wrote to memory of 652 1572 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exe"C:\Users\Admin\AppData\Local\Temp\36489e691b7ecb8dac7db354a4541417f045bb164db520387a4794ce7dfcce31.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:652