Analysis
-
max time kernel
184s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 14:17
Static task
static1
Behavioral task
behavioral1
Sample
1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe
-
Size
511KB
-
MD5
49cda65662a8b15ede22f4004ecad8a9
-
SHA1
657acae955599a789897266383ae5b35bf7accbb
-
SHA256
1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793
-
SHA512
686495966821e03a3b2e1f478d4ff23879eb0e7971f52632a680d32df70e8c84d6096305e329959f0df222143d8b278eb57c4b2c9728b466a70fb18454facca6
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exedescription pid process target process PID 4128 set thread context of 864 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exeRegAsm.exepid process 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe 864 RegAsm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exepid process 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegAsm.exedescription pid process Token: SeDebugPrivilege 864 RegAsm.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exedescription pid process target process PID 4128 wrote to memory of 864 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe RegAsm.exe PID 4128 wrote to memory of 864 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe RegAsm.exe PID 4128 wrote to memory of 864 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe RegAsm.exe PID 4128 wrote to memory of 864 4128 1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe"C:\Users\Admin\AppData\Local\Temp\1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Users\Admin\AppData\Local\Temp\1fe94b43dd1d5dc99c904f219bf10643b40b9ed2357588b85bcaf3de0db75793.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864