Analysis
-
max time kernel
121s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-05-2022 01:14
Static task
static1
Behavioral task
behavioral1
Sample
c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe
Resource
win10v2004-20220414-en
General
-
Target
c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe
-
Size
497KB
-
MD5
b90c9796b39b6664c55ec18526bde217
-
SHA1
ad273a63860bc98579e657adfcc323d55c4dda4c
-
SHA256
c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c
-
SHA512
0d293b649ee1c86df46923df783b63e187cdafe11e1f0af323c863774938b6e85993682ff2cd084b64152dc45e9d51e7f04375af60ebb67bda03c11491f18dc0
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 2304 powershell.exe 2304 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2304 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.execmd.exedescription pid process target process PID 4776 wrote to memory of 3108 4776 c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe cmd.exe PID 4776 wrote to memory of 3108 4776 c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe cmd.exe PID 4776 wrote to memory of 3108 4776 c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe cmd.exe PID 3108 wrote to memory of 2304 3108 cmd.exe powershell.exe PID 3108 wrote to memory of 2304 3108 cmd.exe powershell.exe PID 3108 wrote to memory of 2304 3108 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe"C:\Users\Admin\AppData\Local\Temp\c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2304-142-0x00000000076F0000-0x0000000007D6A000-memory.dmpFilesize
6.5MB
-
memory/2304-136-0x0000000000000000-mapping.dmp
-
memory/2304-144-0x0000000007110000-0x00000000071A6000-memory.dmpFilesize
600KB
-
memory/2304-145-0x00000000070A0000-0x00000000070C2000-memory.dmpFilesize
136KB
-
memory/2304-138-0x00000000053B0000-0x00000000059D8000-memory.dmpFilesize
6.2MB
-
memory/2304-143-0x0000000006600000-0x000000000661A000-memory.dmpFilesize
104KB
-
memory/2304-141-0x0000000006080000-0x000000000609E000-memory.dmpFilesize
120KB
-
memory/2304-137-0x00000000027D0000-0x0000000002806000-memory.dmpFilesize
216KB
-
memory/2304-140-0x00000000059E0000-0x0000000005A46000-memory.dmpFilesize
408KB
-
memory/2304-139-0x0000000005230000-0x0000000005252000-memory.dmpFilesize
136KB
-
memory/3108-135-0x0000000000000000-mapping.dmp
-
memory/4776-134-0x00000000051E0000-0x0000000005272000-memory.dmpFilesize
584KB
-
memory/4776-131-0x0000000004C40000-0x0000000004CA6000-memory.dmpFilesize
408KB
-
memory/4776-130-0x0000000000170000-0x00000000001F2000-memory.dmpFilesize
520KB
-
memory/4776-133-0x0000000004E50000-0x0000000004EEC000-memory.dmpFilesize
624KB
-
memory/4776-132-0x0000000005590000-0x0000000005B34000-memory.dmpFilesize
5.6MB