Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 18:56
Static task
static1
Behavioral task
behavioral1
Sample
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe
-
Size
196KB
-
MD5
1911850718a8685581d389d426d2606c
-
SHA1
4dfc240924a6285290b8d42ede112f6a9ed07e6e
-
SHA256
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c
-
SHA512
a528fadd059b3b4f7d3ab56d02ce91c145bb94911193bd38ed8a229c49f5b6ecf41bfc2ecf71ebdd8e7938d5fd43d925a8d89b7a221795a723c4909a690f8960
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exedescription pid process target process PID 1604 set thread context of 1104 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exePowershell.exepid process 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 1592 Powershell.exe 1592 Powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exePowershell.exedescription pid process Token: SeDebugPrivilege 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe Token: SeDebugPrivilege 1592 Powershell.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exedescription pid process target process PID 1604 wrote to memory of 1104 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1604 wrote to memory of 1104 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1604 wrote to memory of 1104 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1604 wrote to memory of 1104 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1604 wrote to memory of 1104 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1604 wrote to memory of 1104 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1604 wrote to memory of 1104 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1604 wrote to memory of 1104 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe PID 1604 wrote to memory of 1592 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe Powershell.exe PID 1604 wrote to memory of 1592 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe Powershell.exe PID 1604 wrote to memory of 1592 1604 35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe Powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe"C:\Users\Admin\AppData\Local\Temp\35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe"C:\Users\Admin\AppData\Local\Temp\35f773db7425ff423789692d850f714a8ae1429186985339619ab4526e03206c.exe"2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell" Add-MpPreference -ExclusionPath '"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\VideoLAN\vlc.exe"'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1104-134-0x0000000000000000-mapping.dmp
-
memory/1104-150-0x0000000004FB0000-0x000000000504C000-memory.dmpFilesize
624KB
-
memory/1104-135-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1592-142-0x0000000006310000-0x000000000632E000-memory.dmpFilesize
120KB
-
memory/1592-144-0x0000000070460000-0x00000000704AC000-memory.dmpFilesize
304KB
-
memory/1592-153-0x0000000007930000-0x0000000007938000-memory.dmpFilesize
32KB
-
memory/1592-136-0x0000000000000000-mapping.dmp
-
memory/1592-137-0x00000000029D0000-0x0000000002A06000-memory.dmpFilesize
216KB
-
memory/1592-138-0x0000000005650000-0x0000000005C78000-memory.dmpFilesize
6.2MB
-
memory/1592-139-0x0000000005540000-0x0000000005562000-memory.dmpFilesize
136KB
-
memory/1592-140-0x00000000055E0000-0x0000000005646000-memory.dmpFilesize
408KB
-
memory/1592-141-0x0000000005CF0000-0x0000000005D56000-memory.dmpFilesize
408KB
-
memory/1592-152-0x0000000007950000-0x000000000796A000-memory.dmpFilesize
104KB
-
memory/1592-143-0x00000000068D0000-0x0000000006902000-memory.dmpFilesize
200KB
-
memory/1592-151-0x0000000007840000-0x000000000784E000-memory.dmpFilesize
56KB
-
memory/1592-145-0x00000000068B0000-0x00000000068CE000-memory.dmpFilesize
120KB
-
memory/1592-146-0x0000000007C50000-0x00000000082CA000-memory.dmpFilesize
6.5MB
-
memory/1592-147-0x0000000007610000-0x000000000762A000-memory.dmpFilesize
104KB
-
memory/1592-148-0x0000000007680000-0x000000000768A000-memory.dmpFilesize
40KB
-
memory/1592-149-0x0000000007890000-0x0000000007926000-memory.dmpFilesize
600KB
-
memory/1604-131-0x0000000005660000-0x0000000005C04000-memory.dmpFilesize
5.6MB
-
memory/1604-133-0x00000000050D0000-0x00000000050DA000-memory.dmpFilesize
40KB
-
memory/1604-130-0x00000000006E0000-0x0000000000716000-memory.dmpFilesize
216KB
-
memory/1604-132-0x0000000005150000-0x00000000051E2000-memory.dmpFilesize
584KB