Analysis
-
max time kernel
54s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 08:34
Static task
static1
Behavioral task
behavioral1
Sample
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe
-
Size
124KB
-
MD5
d2e6d34475fcba320609b1eb58884525
-
SHA1
f5b6fe51750881f14dfe112c3fe6c90afedb7191
-
SHA256
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d
-
SHA512
3c5c61b971b98e7660467d53bb20e063789aadabeb005336b8144b4d87d9a4de08f39ea90ed598246f48494193ea9eb194b17c173e696621592d07244cd66568
Score
1/10
Malware Config
Signatures
-
Discovers systems in the same network 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exesvchost.exepid process 2216 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe 2216 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe 2216 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe 2216 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe 2964 svchost.exe -
Suspicious use of AdjustPrivilegeToken 27 IoCs
Processes:
whoami.exedescription pid process Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe Token: SeDebugPrivilege 5088 whoami.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exesvchost.exedescription pid process target process PID 2216 wrote to memory of 2964 2216 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe svchost.exe PID 2216 wrote to memory of 2964 2216 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe svchost.exe PID 2216 wrote to memory of 2964 2216 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe svchost.exe PID 2216 wrote to memory of 2964 2216 39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe svchost.exe PID 2964 wrote to memory of 5088 2964 svchost.exe whoami.exe PID 2964 wrote to memory of 5088 2964 svchost.exe whoami.exe PID 2964 wrote to memory of 5088 2964 svchost.exe whoami.exe PID 2964 wrote to memory of 4568 2964 svchost.exe net.exe PID 2964 wrote to memory of 4568 2964 svchost.exe net.exe PID 2964 wrote to memory of 4568 2964 svchost.exe net.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe"C:\Users\Admin\AppData\Local\Temp\39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe "C:\Users\Admin\AppData\Local\Temp\39c49f6d1d7636698f7b1da3f7528798ed4c72d4ba2fb836abfe36cb26b77a0d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\whoami.exeC:\Windows\system32\whoami.exe /all3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
C:\Windows\SysWOW64\net.exeC:\Windows\system32\net.exe view3⤵
- Discovers systems in the same network
PID:4568
-
-