Analysis
-
max time kernel
216s -
max time network
234s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 18:19
Static task
static1
Behavioral task
behavioral1
Sample
a-Skjkmfvbkv.bin.exe
Resource
win7-20221111-en
windows7-x64
17 signatures
150 seconds
Behavioral task
behavioral2
Sample
a-Skjkmfvbkv.bin.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
a-Skjkmfvbkv.bin.exe
-
Size
12KB
-
MD5
8383ef681ba9f25dd7bf49c28cef559e
-
SHA1
12ddeb7c5e504dfbbf194842feb86662c170a8f1
-
SHA256
193d2c92560adcc08eaf3157673b1f835ae85c5c74679cac587e753f67b33dcf
-
SHA512
6ef606af88c235f21868f3e9d8ade4e3eb76308559f54ee2501b6302031bc635d68edd0a23de65a7e7590264827fdff1a4ac7e95d5327bc10fb4839397380af4
-
SSDEEP
384:pUR3OFfFLM89kDKyfjDWwYWxptYcFmVc03K:OOFhv9k28ttYcFmVc6K
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 4124 powershell.exe 4124 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exea-Skjkmfvbkv.bin.exedescription pid process Token: SeDebugPrivilege 4124 powershell.exe Token: SeDebugPrivilege 712 a-Skjkmfvbkv.bin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
a-Skjkmfvbkv.bin.exedescription pid process target process PID 712 wrote to memory of 4124 712 a-Skjkmfvbkv.bin.exe powershell.exe PID 712 wrote to memory of 4124 712 a-Skjkmfvbkv.bin.exe powershell.exe PID 712 wrote to memory of 4124 712 a-Skjkmfvbkv.bin.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a-Skjkmfvbkv.bin.exe"C:\Users\Admin\AppData\Local\Temp\a-Skjkmfvbkv.bin.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-Date2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/712-141-0x0000000005E00000-0x0000000005E0A000-memory.dmpFilesize
40KB
-
memory/712-133-0x00000000055C0000-0x0000000005B64000-memory.dmpFilesize
5.6MB
-
memory/712-135-0x0000000005E10000-0x0000000005EA2000-memory.dmpFilesize
584KB
-
memory/712-132-0x0000000000750000-0x0000000000758000-memory.dmpFilesize
32KB
-
memory/4124-134-0x0000000000000000-mapping.dmp
-
memory/4124-136-0x0000000005020000-0x0000000005056000-memory.dmpFilesize
216KB
-
memory/4124-137-0x0000000005690000-0x0000000005CB8000-memory.dmpFilesize
6.2MB
-
memory/4124-138-0x0000000005E60000-0x0000000005E82000-memory.dmpFilesize
136KB
-
memory/4124-139-0x0000000005F10000-0x0000000005F76000-memory.dmpFilesize
408KB
-
memory/4124-140-0x0000000005F80000-0x0000000005FE6000-memory.dmpFilesize
408KB
-
memory/4124-142-0x0000000006560000-0x000000000657E000-memory.dmpFilesize
120KB
-
memory/4124-143-0x0000000007D80000-0x00000000083FA000-memory.dmpFilesize
6.5MB
-
memory/4124-144-0x0000000006B60000-0x0000000006B7A000-memory.dmpFilesize
104KB