Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:07
Static task
static1
Behavioral task
behavioral1
Sample
74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6.exe
-
Size
754KB
-
MD5
ca12eb7a1b83c0ab450644abf40a6b6c
-
SHA1
d42c8a7c8b17e05fad9463ad7fb6cc87511e27b6
-
SHA256
74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6
-
SHA512
492d936d47c2bc60d15b1a367c1b63803ed0c9f06a4a3a0d09efedcc63d79c82794b1be43cec48a95232ee39d5ef1f62eb7e4c75a145f741cd32b92ce4591d64
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1524 powershell.exe 1524 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3572 74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6.exe Token: SeDebugPrivilege 1524 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3572 wrote to memory of 3680 3572 74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6.exe 80 PID 3572 wrote to memory of 3680 3572 74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6.exe 80 PID 3572 wrote to memory of 3680 3572 74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6.exe 80 PID 3680 wrote to memory of 1524 3680 cmd.exe 82 PID 3680 wrote to memory of 1524 3680 cmd.exe 82 PID 3680 wrote to memory of 1524 3680 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6.exe"C:\Users\Admin\AppData\Local\Temp\74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6.exe' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-