Analysis
-
max time kernel
114s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:33
Static task
static1
Behavioral task
behavioral1
Sample
New_PO_2020805.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
New_PO_2020805.exe
Resource
win10v2004-20220414-en
General
-
Target
New_PO_2020805.exe
-
Size
1.1MB
-
MD5
42a20dafbe6049da3465b4f0b982c414
-
SHA1
e8d4fcd65e005561ce5c699376ad7667d0c0a1b9
-
SHA256
6d2a566cdadb7d1397ba4cc96cf0ad361358a717523f547c30af8c92b88b712b
-
SHA512
b0831bbba1be93c33a67f36e841e5ff1b8c6d84de8cb9ebc3a20e6f5a8f58339deef4d10dc37d10b4a281be9633382c086dfb7ea16d2228fe628a172a4f642b9
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
New_PO_2020805.exedescription pid process target process PID 3048 set thread context of 4380 3048 New_PO_2020805.exe New_PO_2020805.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
New_PO_2020805.exeNew_PO_2020805.exepowershell.exepid process 3048 New_PO_2020805.exe 3048 New_PO_2020805.exe 3048 New_PO_2020805.exe 3048 New_PO_2020805.exe 3048 New_PO_2020805.exe 3048 New_PO_2020805.exe 3048 New_PO_2020805.exe 4380 New_PO_2020805.exe 4380 New_PO_2020805.exe 2132 powershell.exe 2132 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
New_PO_2020805.exeNew_PO_2020805.exepowershell.exedescription pid process Token: SeDebugPrivilege 3048 New_PO_2020805.exe Token: SeDebugPrivilege 4380 New_PO_2020805.exe Token: SeDebugPrivilege 2132 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
New_PO_2020805.exeNew_PO_2020805.execmd.exedescription pid process target process PID 3048 wrote to memory of 4380 3048 New_PO_2020805.exe New_PO_2020805.exe PID 3048 wrote to memory of 4380 3048 New_PO_2020805.exe New_PO_2020805.exe PID 3048 wrote to memory of 4380 3048 New_PO_2020805.exe New_PO_2020805.exe PID 3048 wrote to memory of 4380 3048 New_PO_2020805.exe New_PO_2020805.exe PID 3048 wrote to memory of 4380 3048 New_PO_2020805.exe New_PO_2020805.exe PID 3048 wrote to memory of 4380 3048 New_PO_2020805.exe New_PO_2020805.exe PID 3048 wrote to memory of 4380 3048 New_PO_2020805.exe New_PO_2020805.exe PID 3048 wrote to memory of 4380 3048 New_PO_2020805.exe New_PO_2020805.exe PID 4380 wrote to memory of 3148 4380 New_PO_2020805.exe cmd.exe PID 4380 wrote to memory of 3148 4380 New_PO_2020805.exe cmd.exe PID 4380 wrote to memory of 3148 4380 New_PO_2020805.exe cmd.exe PID 3148 wrote to memory of 2132 3148 cmd.exe powershell.exe PID 3148 wrote to memory of 2132 3148 cmd.exe powershell.exe PID 3148 wrote to memory of 2132 3148 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New_PO_2020805.exe"C:\Users\Admin\AppData\Local\Temp\New_PO_2020805.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\New_PO_2020805.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\New_PO_2020805.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\New_PO_2020805.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New_PO_2020805.exe.logFilesize
412B
MD5ad1c7f6525cfeb54c0487efd38b0e26c
SHA1ed3da94723ac7e3828a9e93d68418bb810592f3b
SHA2560a534a3d0fa82e6a427164c5f6e702cac7e4afc9967af9bc5ddba4f84ab33276
SHA51248d625e6be5391d91d95c2850226fe39bb2411cb72139797699cfe126e6b066182e83950a8ea67e63b64a66b0d45f58d8bc97cab0363d55c2fd88c0d1d28009c
-
memory/2132-146-0x0000000006DF0000-0x0000000006E0A000-memory.dmpFilesize
104KB
-
memory/2132-148-0x0000000006EE0000-0x0000000006F02000-memory.dmpFilesize
136KB
-
memory/2132-147-0x0000000007B60000-0x0000000007BF6000-memory.dmpFilesize
600KB
-
memory/2132-144-0x0000000006900000-0x000000000691E000-memory.dmpFilesize
120KB
-
memory/2132-145-0x0000000008140000-0x00000000087BA000-memory.dmpFilesize
6.5MB
-
memory/2132-139-0x0000000000000000-mapping.dmp
-
memory/2132-140-0x0000000002FD0000-0x0000000003006000-memory.dmpFilesize
216KB
-
memory/2132-141-0x0000000005C00000-0x0000000006228000-memory.dmpFilesize
6.2MB
-
memory/2132-142-0x0000000005960000-0x0000000005982000-memory.dmpFilesize
136KB
-
memory/2132-143-0x0000000005AC0000-0x0000000005B26000-memory.dmpFilesize
408KB
-
memory/3048-132-0x0000000005760000-0x00000000057F2000-memory.dmpFilesize
584KB
-
memory/3048-131-0x0000000005620000-0x00000000056BC000-memory.dmpFilesize
624KB
-
memory/3048-130-0x0000000000800000-0x0000000000912000-memory.dmpFilesize
1.1MB
-
memory/3148-138-0x0000000000000000-mapping.dmp
-
memory/4380-137-0x00000000059E0000-0x0000000005A46000-memory.dmpFilesize
408KB
-
memory/4380-136-0x0000000005E00000-0x00000000063A4000-memory.dmpFilesize
5.6MB
-
memory/4380-134-0x0000000000400000-0x00000000004B8000-memory.dmpFilesize
736KB
-
memory/4380-133-0x0000000000000000-mapping.dmp