Analysis

  • max time kernel
    114s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 00:33

General

  • Target

    New_PO_2020805.exe

  • Size

    1.1MB

  • MD5

    42a20dafbe6049da3465b4f0b982c414

  • SHA1

    e8d4fcd65e005561ce5c699376ad7667d0c0a1b9

  • SHA256

    6d2a566cdadb7d1397ba4cc96cf0ad361358a717523f547c30af8c92b88b712b

  • SHA512

    b0831bbba1be93c33a67f36e841e5ff1b8c6d84de8cb9ebc3a20e6f5a8f58339deef4d10dc37d10b4a281be9633382c086dfb7ea16d2228fe628a172a4f642b9

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New_PO_2020805.exe
    "C:\Users\Admin\AppData\Local\Temp\New_PO_2020805.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\New_PO_2020805.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4380
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\New_PO_2020805.exe' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3148
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\New_PO_2020805.exe'
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2132

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New_PO_2020805.exe.log
    Filesize

    412B

    MD5

    ad1c7f6525cfeb54c0487efd38b0e26c

    SHA1

    ed3da94723ac7e3828a9e93d68418bb810592f3b

    SHA256

    0a534a3d0fa82e6a427164c5f6e702cac7e4afc9967af9bc5ddba4f84ab33276

    SHA512

    48d625e6be5391d91d95c2850226fe39bb2411cb72139797699cfe126e6b066182e83950a8ea67e63b64a66b0d45f58d8bc97cab0363d55c2fd88c0d1d28009c

  • memory/2132-146-0x0000000006DF0000-0x0000000006E0A000-memory.dmp
    Filesize

    104KB

  • memory/2132-148-0x0000000006EE0000-0x0000000006F02000-memory.dmp
    Filesize

    136KB

  • memory/2132-147-0x0000000007B60000-0x0000000007BF6000-memory.dmp
    Filesize

    600KB

  • memory/2132-144-0x0000000006900000-0x000000000691E000-memory.dmp
    Filesize

    120KB

  • memory/2132-145-0x0000000008140000-0x00000000087BA000-memory.dmp
    Filesize

    6.5MB

  • memory/2132-139-0x0000000000000000-mapping.dmp
  • memory/2132-140-0x0000000002FD0000-0x0000000003006000-memory.dmp
    Filesize

    216KB

  • memory/2132-141-0x0000000005C00000-0x0000000006228000-memory.dmp
    Filesize

    6.2MB

  • memory/2132-142-0x0000000005960000-0x0000000005982000-memory.dmp
    Filesize

    136KB

  • memory/2132-143-0x0000000005AC0000-0x0000000005B26000-memory.dmp
    Filesize

    408KB

  • memory/3048-132-0x0000000005760000-0x00000000057F2000-memory.dmp
    Filesize

    584KB

  • memory/3048-131-0x0000000005620000-0x00000000056BC000-memory.dmp
    Filesize

    624KB

  • memory/3048-130-0x0000000000800000-0x0000000000912000-memory.dmp
    Filesize

    1.1MB

  • memory/3148-138-0x0000000000000000-mapping.dmp
  • memory/4380-137-0x00000000059E0000-0x0000000005A46000-memory.dmp
    Filesize

    408KB

  • memory/4380-136-0x0000000005E00000-0x00000000063A4000-memory.dmp
    Filesize

    5.6MB

  • memory/4380-134-0x0000000000400000-0x00000000004B8000-memory.dmp
    Filesize

    736KB

  • memory/4380-133-0x0000000000000000-mapping.dmp