Analysis
-
max time kernel
107s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 21:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmprwm0tnp5.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmprwm0tnp5.exe
Resource
win10v2004-20230221-en
windows10-2004-x64
18 signatures
150 seconds
General
-
Target
tmprwm0tnp5.exe
-
Size
1.6MB
-
MD5
170860057f4aad06ddbeea0ca2b3f1b6
-
SHA1
db04c735b769df458518f959ae7eca39cfa06213
-
SHA256
e2c74cd730a858e1104119028b3d80e338900723485e5f8b6c02fd8eb459a998
-
SHA512
f8bf57126bad026be2414121c798d5688119f06312404c35dea3f457deb717f6422291f5401178586fd23055577f893b4e6236e413c909e3b526c45d3b957766
-
SSDEEP
24576:uU7taDBzgNEfeEvFTMxdzYPh1ogay/zj1weNgcHFx5MpfTjU/c7jNXPohE:uU7PNBmMxdEvogdzxzHFx+pfTgE7VPI
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 844 tmprwm0tnp5.exe 844 tmprwm0tnp5.exe 844 tmprwm0tnp5.exe 844 tmprwm0tnp5.exe 844 tmprwm0tnp5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 844 tmprwm0tnp5.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 844 wrote to memory of 2032 844 tmprwm0tnp5.exe 28 PID 844 wrote to memory of 2032 844 tmprwm0tnp5.exe 28 PID 844 wrote to memory of 2032 844 tmprwm0tnp5.exe 28 PID 844 wrote to memory of 2032 844 tmprwm0tnp5.exe 28 PID 844 wrote to memory of 588 844 tmprwm0tnp5.exe 29 PID 844 wrote to memory of 588 844 tmprwm0tnp5.exe 29 PID 844 wrote to memory of 588 844 tmprwm0tnp5.exe 29 PID 844 wrote to memory of 588 844 tmprwm0tnp5.exe 29 PID 844 wrote to memory of 1380 844 tmprwm0tnp5.exe 30 PID 844 wrote to memory of 1380 844 tmprwm0tnp5.exe 30 PID 844 wrote to memory of 1380 844 tmprwm0tnp5.exe 30 PID 844 wrote to memory of 1380 844 tmprwm0tnp5.exe 30 PID 844 wrote to memory of 696 844 tmprwm0tnp5.exe 31 PID 844 wrote to memory of 696 844 tmprwm0tnp5.exe 31 PID 844 wrote to memory of 696 844 tmprwm0tnp5.exe 31 PID 844 wrote to memory of 696 844 tmprwm0tnp5.exe 31 PID 844 wrote to memory of 1816 844 tmprwm0tnp5.exe 32 PID 844 wrote to memory of 1816 844 tmprwm0tnp5.exe 32 PID 844 wrote to memory of 1816 844 tmprwm0tnp5.exe 32 PID 844 wrote to memory of 1816 844 tmprwm0tnp5.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmprwm0tnp5.exe"C:\Users\Admin\AppData\Local\Temp\tmprwm0tnp5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\tmprwm0tnp5.exe"C:\Users\Admin\AppData\Local\Temp\tmprwm0tnp5.exe"2⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\tmprwm0tnp5.exe"C:\Users\Admin\AppData\Local\Temp\tmprwm0tnp5.exe"2⤵PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\tmprwm0tnp5.exe"C:\Users\Admin\AppData\Local\Temp\tmprwm0tnp5.exe"2⤵PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\tmprwm0tnp5.exe"C:\Users\Admin\AppData\Local\Temp\tmprwm0tnp5.exe"2⤵PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\tmprwm0tnp5.exe"C:\Users\Admin\AppData\Local\Temp\tmprwm0tnp5.exe"2⤵PID:1816
-