Analysis
-
max time kernel
48s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
16-09-2022 10:23
Static task
static1
Behavioral task
behavioral1
Sample
rem order.scr.exe
Resource
win7-20220901-en
windows7-x64
5 signatures
150 seconds
General
-
Target
rem order.scr.exe
-
Size
1.2MB
-
MD5
03b3d450a89959d30f4bfee50b157ad0
-
SHA1
0f47f3a40e0f2ababb272e54bf49fab8f0990009
-
SHA256
e1951d7c32816561ef8f00f5612a088479e1edb3a8cdbc7b7a48d8b60de5c541
-
SHA512
a5e3d89cb9c621dbb1bf89db362f064a32242a362bfd9b564f1e5d000f4b8ae6f82e1f82ddb7a44b70e6217fe760be2b67f940207b4ee9d3610f022080133d60
-
SSDEEP
24576:YlubgKHsv8FE3UkFDYukPLx1S1cayY6Hnt+I0w4hp:Y4sKMUq3Uk50l1IxyrtAwe
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
rem order.scr.exepid process 1760 rem order.scr.exe 1760 rem order.scr.exe 1760 rem order.scr.exe 1760 rem order.scr.exe 1760 rem order.scr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rem order.scr.exedescription pid process Token: SeDebugPrivilege 1760 rem order.scr.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rem order.scr.exepid process 1760 rem order.scr.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
rem order.scr.exepid process 1760 rem order.scr.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
rem order.scr.exedescription pid process target process PID 1760 wrote to memory of 1148 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 1148 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 1148 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 1148 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 1148 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 1148 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 1148 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 856 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 856 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 856 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 856 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 856 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 856 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 856 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 676 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 676 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 676 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 676 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 676 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 676 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 676 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 1108 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 1108 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 1108 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 1108 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 1108 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 1108 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 1108 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 516 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 516 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 516 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 516 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 516 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 516 1760 rem order.scr.exe rem order.scr.exe PID 1760 wrote to memory of 516 1760 rem order.scr.exe rem order.scr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rem order.scr.exe"C:\Users\Admin\AppData\Local\Temp\rem order.scr.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rem order.scr.exe"C:\Users\Admin\AppData\Local\Temp\rem order.scr.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\rem order.scr.exe"C:\Users\Admin\AppData\Local\Temp\rem order.scr.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\rem order.scr.exe"C:\Users\Admin\AppData\Local\Temp\rem order.scr.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\rem order.scr.exe"C:\Users\Admin\AppData\Local\Temp\rem order.scr.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\rem order.scr.exe"C:\Users\Admin\AppData\Local\Temp\rem order.scr.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1760-54-0x0000000000170000-0x00000000002AE000-memory.dmpFilesize
1.2MB
-
memory/1760-55-0x0000000075931000-0x0000000075933000-memory.dmpFilesize
8KB
-
memory/1760-56-0x00000000003D0000-0x00000000003E6000-memory.dmpFilesize
88KB
-
memory/1760-57-0x0000000000420000-0x000000000042C000-memory.dmpFilesize
48KB
-
memory/1760-58-0x00000000080B0000-0x0000000008180000-memory.dmpFilesize
832KB
-
memory/1760-59-0x0000000007F10000-0x0000000007F8C000-memory.dmpFilesize
496KB