Analysis
-
max time kernel
131s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-05-2022 02:32
Static task
static1
Behavioral task
behavioral1
Sample
4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe
-
Size
974KB
-
MD5
8089de419f5fc9e263ca1439a4b5245b
-
SHA1
e4e9e1bd91630cc702c862ceeac16215174249b4
-
SHA256
4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800
-
SHA512
715b3cf733554135292757a9942cdc6bf9682e2b54be8d9a03a668ce0e5e5bf1835320803ccc45a087866e2b03a7d189ff2d0a8e73244c88b03dfc15463300e7
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1756 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 27 PID 1704 wrote to memory of 1756 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 27 PID 1704 wrote to memory of 1756 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 27 PID 1704 wrote to memory of 1756 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 27 PID 1704 wrote to memory of 1732 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 28 PID 1704 wrote to memory of 1732 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 28 PID 1704 wrote to memory of 1732 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 28 PID 1704 wrote to memory of 1732 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 28 PID 1704 wrote to memory of 1720 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 29 PID 1704 wrote to memory of 1720 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 29 PID 1704 wrote to memory of 1720 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 29 PID 1704 wrote to memory of 1720 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 29 PID 1704 wrote to memory of 1972 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 30 PID 1704 wrote to memory of 1972 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 30 PID 1704 wrote to memory of 1972 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 30 PID 1704 wrote to memory of 1972 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 30 PID 1704 wrote to memory of 520 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 31 PID 1704 wrote to memory of 520 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 31 PID 1704 wrote to memory of 520 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 31 PID 1704 wrote to memory of 520 1704 4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe"C:\Users\Admin\AppData\Local\Temp\4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe"{path}"2⤵PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe"{path}"2⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe"{path}"2⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe"{path}"2⤵PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\4a638a4493725c524ab6db6f0a41781d881aaccb305d90168c17023616b34800.exe"{path}"2⤵PID:520
-