Analysis
-
max time kernel
51s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
31-10-2022 20:48
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220901-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
934KB
-
MD5
9bd821ba65b89710d2d81c7a7b98ab5d
-
SHA1
cbdc6446729b60601f7c288bc063cd9cc216f925
-
SHA256
99d28200203baac82a7253419526711f38d7ecb1a6098f243c8656adc72ef6d8
-
SHA512
30ad861b9015a201cec5e6a88ce6cba3e03459f1c709ef50c89505de96e5760e7c1647dc8382751fffc3c9ed843b539114b52051e8d564c6fde7fad08436c5a4
-
SSDEEP
24576:xcCEmyVj6jI43L84UytM00todtTQxRjU/oe:xcCRI6jIepUy+ZtmdGR
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
tmp.exepid process 832 tmp.exe 832 tmp.exe 832 tmp.exe 832 tmp.exe 832 tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tmp.exedescription pid process Token: SeDebugPrivilege 832 tmp.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
tmp.exedescription pid process target process PID 832 wrote to memory of 2040 832 tmp.exe tmp.exe PID 832 wrote to memory of 2040 832 tmp.exe tmp.exe PID 832 wrote to memory of 2040 832 tmp.exe tmp.exe PID 832 wrote to memory of 2040 832 tmp.exe tmp.exe PID 832 wrote to memory of 1052 832 tmp.exe tmp.exe PID 832 wrote to memory of 1052 832 tmp.exe tmp.exe PID 832 wrote to memory of 1052 832 tmp.exe tmp.exe PID 832 wrote to memory of 1052 832 tmp.exe tmp.exe PID 832 wrote to memory of 1740 832 tmp.exe tmp.exe PID 832 wrote to memory of 1740 832 tmp.exe tmp.exe PID 832 wrote to memory of 1740 832 tmp.exe tmp.exe PID 832 wrote to memory of 1740 832 tmp.exe tmp.exe PID 832 wrote to memory of 1988 832 tmp.exe tmp.exe PID 832 wrote to memory of 1988 832 tmp.exe tmp.exe PID 832 wrote to memory of 1988 832 tmp.exe tmp.exe PID 832 wrote to memory of 1988 832 tmp.exe tmp.exe PID 832 wrote to memory of 2008 832 tmp.exe tmp.exe PID 832 wrote to memory of 2008 832 tmp.exe tmp.exe PID 832 wrote to memory of 2008 832 tmp.exe tmp.exe PID 832 wrote to memory of 2008 832 tmp.exe tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/832-54-0x0000000000330000-0x0000000000420000-memory.dmpFilesize
960KB
-
memory/832-55-0x0000000075091000-0x0000000075093000-memory.dmpFilesize
8KB
-
memory/832-56-0x0000000005000000-0x00000000050E4000-memory.dmpFilesize
912KB
-
memory/832-57-0x0000000000A50000-0x0000000000A66000-memory.dmpFilesize
88KB
-
memory/832-58-0x0000000007E10000-0x0000000007EC0000-memory.dmpFilesize
704KB
-
memory/832-59-0x0000000005CD0000-0x0000000005D4A000-memory.dmpFilesize
488KB