Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
PI160256.exe
Resource
win7-20230220-en
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
PI160256.exe
Resource
win10v2004-20230220-en
8 signatures
150 seconds
General
-
Target
PI160256.exe
-
Size
1.1MB
-
MD5
52c391a4d3224a3bed92f831d4e1236a
-
SHA1
0ddf484664dacb98fa7e7b7aca6cdcb31b4b3216
-
SHA256
7fd5172067f790c21d11dc37987f04bbe9e4c04038074b788ac79bcc83c06f1a
-
SHA512
c40e3a404799b24edf124fbae410baca2e6f81a25b2cdc36f53c0c212be3caad9b5f8afe9f55374e4234dcff577156ab19bb7a7deba0873ccbcc0f70d604748e
-
SSDEEP
24576:1MWfSukGK9fNqt4NaYgHvOznGVPKl4OMODDf2+:GUSn5Nqtyg23Hf/
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2496 set thread context of 2948 2496 PI160256.exe 94 PID 2948 set thread context of 3188 2948 RegSvcs.exe 49 PID 1260 set thread context of 3188 1260 msiexec.exe 49 -
Program crash 1 IoCs
pid pid_target Process procid_target 2304 640 WerFault.exe 100 -
description ioc Process Key created \Registry\User\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 2496 PI160256.exe 2496 PI160256.exe 2496 PI160256.exe 2496 PI160256.exe 2948 RegSvcs.exe 2948 RegSvcs.exe 2948 RegSvcs.exe 2948 RegSvcs.exe 2948 RegSvcs.exe 2948 RegSvcs.exe 2948 RegSvcs.exe 2948 RegSvcs.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3188 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2948 RegSvcs.exe 2948 RegSvcs.exe 2948 RegSvcs.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe 1260 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2496 PI160256.exe Token: SeDebugPrivilege 2948 RegSvcs.exe Token: SeDebugPrivilege 1260 msiexec.exe Token: SeShutdownPrivilege 3188 Explorer.EXE Token: SeCreatePagefilePrivilege 3188 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3408 2496 PI160256.exe 93 PID 2496 wrote to memory of 3408 2496 PI160256.exe 93 PID 2496 wrote to memory of 3408 2496 PI160256.exe 93 PID 2496 wrote to memory of 2948 2496 PI160256.exe 94 PID 2496 wrote to memory of 2948 2496 PI160256.exe 94 PID 2496 wrote to memory of 2948 2496 PI160256.exe 94 PID 2496 wrote to memory of 2948 2496 PI160256.exe 94 PID 2496 wrote to memory of 2948 2496 PI160256.exe 94 PID 2496 wrote to memory of 2948 2496 PI160256.exe 94 PID 3188 wrote to memory of 1260 3188 Explorer.EXE 95 PID 3188 wrote to memory of 1260 3188 Explorer.EXE 95 PID 3188 wrote to memory of 1260 3188 Explorer.EXE 95 PID 1260 wrote to memory of 640 1260 msiexec.exe 100 PID 1260 wrote to memory of 640 1260 msiexec.exe 100 PID 1260 wrote to memory of 640 1260 msiexec.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\PI160256.exe"C:\Users\Admin\AppData\Local\Temp\PI160256.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:3408
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:640
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 640 -s 1284⤵
- Program crash
PID:2304
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 440 -p 640 -ip 6401⤵PID:2660