Analysis
-
max time kernel
184s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 14:08
Static task
static1
Behavioral task
behavioral1
Sample
eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe
-
Size
1.2MB
-
MD5
72612c0ae5454485e2c5201555673ccc
-
SHA1
6d7e8a9e95aa3eab29be870aa05eb5d4d787085a
-
SHA256
eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f
-
SHA512
6b998f4730b8c2bbf707c60b68713ebac5a54d762a5c09fc12ba28abcb1ecaa00a4ba198ebbf88ab9602e2567dc0e5491b9fec915223862e0747428fbca545a2
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exepowershell.exepid process 892 eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe 892 eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe 892 eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe 892 eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe 892 eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe 2972 powershell.exe 2972 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exepowershell.exedescription pid process Token: SeDebugPrivilege 892 eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe Token: SeDebugPrivilege 2972 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.execmd.exedescription pid process target process PID 892 wrote to memory of 3144 892 eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe cmd.exe PID 892 wrote to memory of 3144 892 eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe cmd.exe PID 892 wrote to memory of 3144 892 eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe cmd.exe PID 3144 wrote to memory of 2972 3144 cmd.exe powershell.exe PID 3144 wrote to memory of 2972 3144 cmd.exe powershell.exe PID 3144 wrote to memory of 2972 3144 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe"C:\Users\Admin\AppData\Local\Temp\eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\eff032aac3bd1383f47cbba29306f786b2fa93c66ff7b71874fdd78938188f5f.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972