Analysis
-
max time kernel
112s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 19:11
Static task
static1
Behavioral task
behavioral1
Sample
doc07675720200626101857.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
doc07675720200626101857.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
doc07675720200626101857.exe
-
Size
930KB
-
MD5
243a515982e6eba872d6366ec71d63b6
-
SHA1
85b71070f258dce1b5f92ea4aaa117419f6b8828
-
SHA256
420da876f8efdf70da0ec0ccd1b7aaa09547b6868d5fc655c05b50eadf20c360
-
SHA512
cfaf4f25351c10962d143de38df4758d1359224975520bc1345d284ab62254b75e6115c1283b47331b312e0e624329f8c402235cb8682d9007419ad0b89122a4
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1928 set thread context of 4316 1928 doc07675720200626101857.exe 81 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1928 doc07675720200626101857.exe 1928 doc07675720200626101857.exe 1876 powershell.exe 1876 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1928 doc07675720200626101857.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1876 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1928 wrote to memory of 4316 1928 doc07675720200626101857.exe 81 PID 1928 wrote to memory of 4316 1928 doc07675720200626101857.exe 81 PID 1928 wrote to memory of 4316 1928 doc07675720200626101857.exe 81 PID 4316 wrote to memory of 4136 4316 doc07675720200626101857.exe 82 PID 4316 wrote to memory of 4136 4316 doc07675720200626101857.exe 82 PID 4316 wrote to memory of 4136 4316 doc07675720200626101857.exe 82 PID 4136 wrote to memory of 1876 4136 cmd.exe 84 PID 4136 wrote to memory of 1876 4136 cmd.exe 84 PID 4136 wrote to memory of 1876 4136 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\doc07675720200626101857.exe"C:\Users\Admin\AppData\Local\Temp\doc07675720200626101857.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\doc07675720200626101857.exe"C:\Users\Admin\AppData\Local\Temp\doc07675720200626101857.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\doc07675720200626101857.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\doc07675720200626101857.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
-