Analysis
-
max time kernel
45s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 22:56
Behavioral task
behavioral1
Sample
a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762.exe
Resource
win7-20221111-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762.exe
Resource
win10v2004-20221111-en
5 signatures
150 seconds
General
-
Target
a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762.exe
-
Size
78KB
-
MD5
fc2fba178c9f28fb4838e8a46bfb6676
-
SHA1
e382aa20bc3c112383341931e01fccc82edb559b
-
SHA256
a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762
-
SHA512
dacf3ddbc53c2da60bf451f94c1664e308ba4189454a93d23f5c2442d82a193b8c422acf2cd020ba4bc08736f239ce3b31d82c3ebfec5ff2f9dfe5136902bb66
-
SSDEEP
1536:HenrpI1vRtWWbxq5PH5l5xqXyWsSM3qBeliR136t3JyxZWDFDbejTCNYrb:ErpI1vTtkxjAI47qWxZ6oNr
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/536-54-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral1/memory/536-58-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1644 536 WerFault.exe 20 -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1452 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1452 tasklist.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 536 wrote to memory of 1108 536 a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762.exe 28 PID 536 wrote to memory of 1108 536 a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762.exe 28 PID 536 wrote to memory of 1108 536 a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762.exe 28 PID 536 wrote to memory of 1108 536 a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762.exe 28 PID 1108 wrote to memory of 1452 1108 cmd.exe 30 PID 1108 wrote to memory of 1452 1108 cmd.exe 30 PID 1108 wrote to memory of 1452 1108 cmd.exe 30 PID 1108 wrote to memory of 1452 1108 cmd.exe 30 PID 536 wrote to memory of 1644 536 a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762.exe 32 PID 536 wrote to memory of 1644 536 a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762.exe 32 PID 536 wrote to memory of 1644 536 a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762.exe 32 PID 536 wrote to memory of 1644 536 a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762.exe"C:\Users\Admin\AppData\Local\Temp\a5cb1a34584b2b77225a0b460a7994748909fec313a830094d0438b54098f762.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c tasklist.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\tasklist.exetasklist.exe3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 1842⤵
- Program crash
PID:1644
-