Analysis
-
max time kernel
61s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 08:34
Static task
static1
Behavioral task
behavioral1
Sample
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe
-
Size
124KB
-
MD5
d2e6d34475fcba320609b1eb58884525
-
SHA1
f5b6fe51750881f14dfe112c3fe6c90afedb7191
-
SHA256
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d
-
SHA512
3c5c61b971b98e7660467d53bb20e063789aadabeb005336b8144b4d87d9a4de08f39ea90ed598246f48494193ea9eb194b17c173e696621592d07244cd66568
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1604 svchost.exe -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 1644 net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe 1604 svchost.exe 1604 svchost.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1360 wrote to memory of 1604 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe 29 PID 1360 wrote to memory of 1604 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe 29 PID 1360 wrote to memory of 1604 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe 29 PID 1360 wrote to memory of 1604 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe 29 PID 1360 wrote to memory of 1604 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe 29 PID 1604 wrote to memory of 1020 1604 svchost.exe 30 PID 1604 wrote to memory of 1020 1604 svchost.exe 30 PID 1604 wrote to memory of 1020 1604 svchost.exe 30 PID 1604 wrote to memory of 1020 1604 svchost.exe 30 PID 1604 wrote to memory of 1644 1604 svchost.exe 32 PID 1604 wrote to memory of 1644 1604 svchost.exe 32 PID 1604 wrote to memory of 1644 1604 svchost.exe 32 PID 1604 wrote to memory of 1644 1604 svchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe"C:\Users\Admin\AppData\Local\Temp\39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe "C:\Users\Admin\AppData\Local\Temp\39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe"2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\whoami.exeC:\Windows\system32\whoami.exe /all3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Windows\SysWOW64\net.exeC:\Windows\system32\net.exe view3⤵
- Discovers systems in the same network
PID:1644
-
-