Analysis
-
max time kernel
134s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:38
Static task
static1
Behavioral task
behavioral1
Sample
Anti Markietng Purchase Order Sheets.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Anti Markietng Purchase Order Sheets.exe
Resource
win10v2004-20220414-en
General
-
Target
Anti Markietng Purchase Order Sheets.exe
-
Size
1.0MB
-
MD5
879f8158a062005bd3976a45233f8c69
-
SHA1
d6c3f71339d930006117125c007e2ea199e221f6
-
SHA256
3f97dfbae448b3eb28d6f08f666029037d890dc94dbce0e372b4dd2a63fd037f
-
SHA512
306f0f81cc26e2108ab1270be6eb9f1842539079ea174e471a0019b97078df54f257e735cde6d2e076373473d4612bf5f0835e00a963da7b0999fceb216931d9
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Anti Markietng Purchase Order Sheets.exedescription pid process target process PID 1740 set thread context of 4392 1740 Anti Markietng Purchase Order Sheets.exe Anti Markietng Purchase Order Sheets.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
Anti Markietng Purchase Order Sheets.exepowershell.exepid process 1740 Anti Markietng Purchase Order Sheets.exe 1740 Anti Markietng Purchase Order Sheets.exe 1740 Anti Markietng Purchase Order Sheets.exe 1740 Anti Markietng Purchase Order Sheets.exe 1740 Anti Markietng Purchase Order Sheets.exe 1740 Anti Markietng Purchase Order Sheets.exe 1740 Anti Markietng Purchase Order Sheets.exe 4420 powershell.exe 4420 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Anti Markietng Purchase Order Sheets.exepowershell.exedescription pid process Token: SeDebugPrivilege 1740 Anti Markietng Purchase Order Sheets.exe Token: SeDebugPrivilege 4420 powershell.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Anti Markietng Purchase Order Sheets.exeAnti Markietng Purchase Order Sheets.execmd.exedescription pid process target process PID 1740 wrote to memory of 4392 1740 Anti Markietng Purchase Order Sheets.exe Anti Markietng Purchase Order Sheets.exe PID 1740 wrote to memory of 4392 1740 Anti Markietng Purchase Order Sheets.exe Anti Markietng Purchase Order Sheets.exe PID 1740 wrote to memory of 4392 1740 Anti Markietng Purchase Order Sheets.exe Anti Markietng Purchase Order Sheets.exe PID 1740 wrote to memory of 4392 1740 Anti Markietng Purchase Order Sheets.exe Anti Markietng Purchase Order Sheets.exe PID 1740 wrote to memory of 4392 1740 Anti Markietng Purchase Order Sheets.exe Anti Markietng Purchase Order Sheets.exe PID 1740 wrote to memory of 4392 1740 Anti Markietng Purchase Order Sheets.exe Anti Markietng Purchase Order Sheets.exe PID 1740 wrote to memory of 4392 1740 Anti Markietng Purchase Order Sheets.exe Anti Markietng Purchase Order Sheets.exe PID 1740 wrote to memory of 4392 1740 Anti Markietng Purchase Order Sheets.exe Anti Markietng Purchase Order Sheets.exe PID 4392 wrote to memory of 2572 4392 Anti Markietng Purchase Order Sheets.exe cmd.exe PID 4392 wrote to memory of 2572 4392 Anti Markietng Purchase Order Sheets.exe cmd.exe PID 4392 wrote to memory of 2572 4392 Anti Markietng Purchase Order Sheets.exe cmd.exe PID 2572 wrote to memory of 4420 2572 cmd.exe powershell.exe PID 2572 wrote to memory of 4420 2572 cmd.exe powershell.exe PID 2572 wrote to memory of 4420 2572 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Anti Markietng Purchase Order Sheets.exe"C:\Users\Admin\AppData\Local\Temp\Anti Markietng Purchase Order Sheets.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Anti Markietng Purchase Order Sheets.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Anti Markietng Purchase Order Sheets.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Anti Markietng Purchase Order Sheets.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Anti Markietng Purchase Order Sheets.exe.log
Filesize507B
MD58cf94b5356be60247d331660005941ec
SHA1fdedb361f40f22cb6a086c808fc0056d4e421131
SHA25652a5b2d36f2b72cb02c695cf7ef46444dda73d4ea82a73e0894c805fa9987bc0
SHA512b886dfc8bf03f8627f051fb6e2ac40ae2e7713584695a365728eb2e2c87217830029aa35bd129c642fa03dde3f7a7dd5690b16248676be60a6bb5f497fb23651