Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2023, 04:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
STATEMENT.exe
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
STATEMENT.exe
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
STATEMENT.exe
-
Size
617KB
-
MD5
52597a814ee98411fb5c4c501318a5c3
-
SHA1
89b89a395ddca41d2a98a4e90e70da1940755133
-
SHA256
51f4e780d426b0e4c12670d49f67ff26257a487d93efcc4e593e133dc99a5bfb
-
SHA512
30afc5371cedfae3d872fa11c738f2257b5f72f220ee7c16ce5824e0036e3b19a94020739783bca16d1f3a81ffe7e93b19257cbb6956c6c10982bca5ebcdca11
-
SSDEEP
12288:GQv53atccKYCmv0b1Ce9IuwxtJ2o65E6KGoxEB0Ucbi+iP7oMMsKCm:n9a2pHrF9I3xToEhrScqMfvC
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1548 set thread context of 876 1548 STATEMENT.exe 92 -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1548 STATEMENT.exe 1548 STATEMENT.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe 876 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1548 STATEMENT.exe Token: SeDebugPrivilege 876 RegSvcs.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1548 wrote to memory of 876 1548 STATEMENT.exe 92 PID 1548 wrote to memory of 876 1548 STATEMENT.exe 92 PID 1548 wrote to memory of 876 1548 STATEMENT.exe 92 PID 1548 wrote to memory of 876 1548 STATEMENT.exe 92 PID 1548 wrote to memory of 876 1548 STATEMENT.exe 92 PID 1548 wrote to memory of 876 1548 STATEMENT.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\STATEMENT.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:876
-