Analysis
-
max time kernel
148s -
max time network
66s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 18:56
Static task
static1
Behavioral task
behavioral1
Sample
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe
-
Size
196KB
-
MD5
1911850718a8685581d389d426d2606c
-
SHA1
4dfc240924a6285290b8d42ede112f6a9ed07e6e
-
SHA256
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c
-
SHA512
a528fadd059b3b4f7d3ab56d02ce91c145bb94911193bd38ed8a229c49f5b6ecf41bfc2ecf71ebdd8e7938d5fd43d925a8d89b7a221795a723c4909a690f8960
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exedescription pid process target process PID 1932 set thread context of 1992 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exePowershell.exepid process 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 1984 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exePowershell.exedescription pid process Token: SeDebugPrivilege 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe Token: SeDebugPrivilege 1984 Powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exedescription pid process target process PID 1932 wrote to memory of 1992 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1932 wrote to memory of 1992 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1932 wrote to memory of 1992 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1932 wrote to memory of 1992 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1932 wrote to memory of 1992 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1932 wrote to memory of 1992 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1932 wrote to memory of 1992 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1932 wrote to memory of 1992 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1932 wrote to memory of 1992 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1932 wrote to memory of 1984 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe Powershell.exe PID 1932 wrote to memory of 1984 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe Powershell.exe PID 1932 wrote to memory of 1984 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe Powershell.exe PID 1932 wrote to memory of 1984 1932 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe Powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe"C:\Users\Admin\AppData\Local\Temp\35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe"C:\Users\Admin\AppData\Local\Temp\35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe"2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell" Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe"'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1932-54-0x0000000001200000-0x0000000001236000-memory.dmpFilesize
216KB
-
memory/1932-55-0x00000000757C1000-0x00000000757C3000-memory.dmpFilesize
8KB
-
memory/1932-56-0x0000000000960000-0x000000000099E000-memory.dmpFilesize
248KB
-
memory/1984-70-0x00000000719E0000-0x0000000071F8B000-memory.dmpFilesize
5.7MB
-
memory/1984-68-0x0000000000000000-mapping.dmp
-
memory/1992-61-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1992-60-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1992-62-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1992-63-0x00000000004250EE-mapping.dmp
-
memory/1992-65-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1992-67-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1992-58-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1992-57-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB