Analysis
-
max time kernel
762s -
max time network
898s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07-12-2022 01:02
Static task
static1
Behavioral task
behavioral1
Sample
简历.zip
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
简历.zip
Resource
win10v2004-20220901-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
简历.zip
-
Size
168KB
-
MD5
f1c56cc405029826cf7a21a1394bf18e
-
SHA1
1b9080ac30d6fc8963457e90aa9d5e56bb7eace0
-
SHA256
4e7a06b20666a62613cca9f75ae58a35cfc5d721c05c8b435170a4e8024ba87e
-
SHA512
31597e85de1b58bfadc88f2b79bc0f7dcaa79d8d63cdb4517cb35f7d99df643ab34b096931af44029e3c16c5ed6a183437009a4dc144c65cbf15034c7c6caa53
-
SSDEEP
3072:v0qEgiHe4UvUmvUVCn/CudT8opk05O/q9hLLePw/95HMxlvFiqbM9PjX:nQewOv/DqoXQ/q9hvX15HMxl08OjX
Score
1/10
Malware Config
Signatures
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 1708 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tasklist.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 1672 tasklist.exe Token: SeDebugPrivilege 1708 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exedescription pid process target process PID 1212 wrote to memory of 1672 1212 cmd.exe tasklist.exe PID 1212 wrote to memory of 1672 1212 cmd.exe tasklist.exe PID 1212 wrote to memory of 1672 1212 cmd.exe tasklist.exe PID 1212 wrote to memory of 1708 1212 cmd.exe NETSTAT.EXE PID 1212 wrote to memory of 1708 1212 cmd.exe NETSTAT.EXE PID 1212 wrote to memory of 1708 1212 cmd.exe NETSTAT.EXE
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\简历.zip1⤵PID:1096
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\system32\NETSTAT.EXEnetstat -ano2⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
C:\Users\Admin\Desktop\简历\+=+·\-¦¦p+¿+¦-++-+ -¦¦--¦=-º .exe"C:\Users\Admin\Desktop\简历\+=+·\-¦¦p+¿+¦-++-+ -¦¦--¦=-º .exe"1⤵PID:872