Analysis
-
max time kernel
61s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 08:34
Static task
static1
Behavioral task
behavioral1
Sample
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe
-
Size
124KB
-
MD5
d2e6d34475fcba320609b1eb58884525
-
SHA1
f5b6fe51750881f14dfe112c3fe6c90afedb7191
-
SHA256
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d
-
SHA512
3c5c61b971b98e7660467d53bb20e063789aadabeb005336b8144b4d87d9a4de08f39ea90ed598246f48494193ea9eb194b17c173e696621592d07244cd66568
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
svchost.exepid process 1604 svchost.exe -
Discovers systems in the same network 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exesvchost.exepid process 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe 1604 svchost.exe 1604 svchost.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
whoami.exedescription pid process Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe Token: SeDebugPrivilege 1020 whoami.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exesvchost.exedescription pid process target process PID 1360 wrote to memory of 1604 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe svchost.exe PID 1360 wrote to memory of 1604 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe svchost.exe PID 1360 wrote to memory of 1604 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe svchost.exe PID 1360 wrote to memory of 1604 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe svchost.exe PID 1360 wrote to memory of 1604 1360 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe svchost.exe PID 1604 wrote to memory of 1020 1604 svchost.exe whoami.exe PID 1604 wrote to memory of 1020 1604 svchost.exe whoami.exe PID 1604 wrote to memory of 1020 1604 svchost.exe whoami.exe PID 1604 wrote to memory of 1020 1604 svchost.exe whoami.exe PID 1604 wrote to memory of 1644 1604 svchost.exe net.exe PID 1604 wrote to memory of 1644 1604 svchost.exe net.exe PID 1604 wrote to memory of 1644 1604 svchost.exe net.exe PID 1604 wrote to memory of 1644 1604 svchost.exe net.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe"C:\Users\Admin\AppData\Local\Temp\39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe "C:\Users\Admin\AppData\Local\Temp\39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe"2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\whoami.exeC:\Windows\system32\whoami.exe /all3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Windows\SysWOW64\net.exeC:\Windows\system32\net.exe view3⤵
- Discovers systems in the same network
PID:1644
-
-