Analysis
-
max time kernel
144s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 18:01
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20230220-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
sample.exe
-
Size
57.4MB
-
MD5
19263420e7ff10b65f0677a2ec621c7e
-
SHA1
57542d9dfca7b87359ed8b8b1bcb393cd4ff54a1
-
SHA256
0d5b423fdb36b35af689c4032b4911d39267afa978e006ff2272441ea91d082d
-
SHA512
e899074d8b41d47680fee174fac36632dd1a18650728682fc528b005e9e1d34ecf92ae154970da9772259100c1b3f6eaa92db9777ff42b2da0dfb84d2f0443ef
-
SSDEEP
393216:uirSIUJHFC2b5mXKQ/kb/psajPaoGiOuBk8K0fUAjMsKMWm3gXvLhbMb7o3a9Cc1:uj1CXF092XvCYuCcwTpH43pb
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4064 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4064 tasklist.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2244 2936 sample.exe 85 PID 2936 wrote to memory of 2244 2936 sample.exe 85 PID 2244 wrote to memory of 4064 2244 cmd.exe 86 PID 2244 wrote to memory of 4064 2244 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "tasklist"2⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-