Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2022 10:48
Static task
static1
Behavioral task
behavioral1
Sample
Уговорна документа.exe
Resource
win7-20220812-en
windows7-x64
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
Уговорна документа.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Уговорна документа.exe
-
Size
996KB
-
MD5
b6af43df5bee9e8447c6f103482c0bd3
-
SHA1
571a753a008c8722b1b0d7f299215c4c34908867
-
SHA256
0e730ca24e30d7fb72181befa3b88400a62f321be94db3e2ac4883fa4efa5ad7
-
SHA512
26c8a5323e62a6108737d8506369c0df32a3293cbf28f77db180d57606f729e07d48079ea32dcccf8e66d3ade7bb89c740c65d831f3ffca57b5dbdc657bbafe2
-
SSDEEP
24576:O/XwrWFkHj72rWtGKfAOMbjush3WoN+ebEkq8ICQ:ywrWFOj7+WtRxCjushmogebEkq85Q
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Уговорна документа.exepowershell.exepid process 2824 Уговорна документа.exe 2824 Уговорна документа.exe 2844 powershell.exe 2844 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Уговорна документа.exepowershell.exedescription pid process Token: SeDebugPrivilege 2824 Уговорна документа.exe Token: SeDebugPrivilege 2844 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Уговорна документа.execmd.exedescription pid process target process PID 2824 wrote to memory of 3580 2824 Уговорна документа.exe cmd.exe PID 2824 wrote to memory of 3580 2824 Уговорна документа.exe cmd.exe PID 2824 wrote to memory of 3580 2824 Уговорна документа.exe cmd.exe PID 3580 wrote to memory of 2844 3580 cmd.exe powershell.exe PID 3580 wrote to memory of 2844 3580 cmd.exe powershell.exe PID 3580 wrote to memory of 2844 3580 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Уговорна документа.exe"C:\Users\Admin\AppData\Local\Temp\Уговорна документа.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Уговорна документа.exe' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Local\Temp\Уговорна документа.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-