Analysis
-
max time kernel
121s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-05-2022 01:14
Static task
static1
Behavioral task
behavioral1
Sample
c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe
-
Size
497KB
-
MD5
b90c9796b39b6664c55ec18526bde217
-
SHA1
ad273a63860bc98579e657adfcc323d55c4dda4c
-
SHA256
c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c
-
SHA512
0d293b649ee1c86df46923df783b63e187cdafe11e1f0af323c863774938b6e85993682ff2cd084b64152dc45e9d51e7f04375af60ebb67bda03c11491f18dc0
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2304 powershell.exe 2304 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2304 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4776 wrote to memory of 3108 4776 c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe 82 PID 4776 wrote to memory of 3108 4776 c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe 82 PID 4776 wrote to memory of 3108 4776 c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe 82 PID 3108 wrote to memory of 2304 3108 cmd.exe 83 PID 3108 wrote to memory of 2304 3108 cmd.exe 83 PID 3108 wrote to memory of 2304 3108 cmd.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe"C:\Users\Admin\AppData\Local\Temp\c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\c87fa3ba0611689621a7c868d32f9d0bb1e5d557727639b72fc8804f834a3c6c.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-