Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2023, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Client.exe
Resource
win10v2004-20230220-en
General
-
Target
Client.exe
-
Size
7KB
-
MD5
0942702afc756667e0260c811571c48a
-
SHA1
01b0b8e076ff25d22415fece6c3461e6a40b5660
-
SHA256
38f1ad3d84b03d2c5641d6a3864d7936bf7efecf5e5afa6eb3eeaeefa54b75aa
-
SHA512
5d8d30379b3d6d120f1ec618f223f6d16d688a4572dbd0baa370342db6aef568efecad079a55b35227716e0ed1ed5a4e049705e3c731fe4c0fca7acdc09a6e7c
-
SSDEEP
96:UOv6SyQzxHLFdzP5zkdlRa0xcRvOqYhND+t/Gz4ozc6f7hnuCBfzNt:BUQBxzkhc9OqYHG/Gsodf7hnuoJ
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3424 powershell.exe 3424 powershell.exe 4436 powershell.exe 4436 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3424 powershell.exe Token: SeDebugPrivilege 4436 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1688 wrote to memory of 3424 1688 Client.exe 89 PID 1688 wrote to memory of 3424 1688 Client.exe 89 PID 1688 wrote to memory of 3424 1688 Client.exe 89 PID 3424 wrote to memory of 2212 3424 powershell.exe 92 PID 3424 wrote to memory of 2212 3424 powershell.exe 92 PID 3424 wrote to memory of 2212 3424 powershell.exe 92 PID 1688 wrote to memory of 4436 1688 Client.exe 94 PID 1688 wrote to memory of 4436 1688 Client.exe 94 PID 1688 wrote to memory of 4436 1688 Client.exe 94 PID 4436 wrote to memory of 1288 4436 powershell.exe 96 PID 4436 wrote to memory of 1288 4436 powershell.exe 96 PID 4436 wrote to memory of 1288 4436 powershell.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" start notepad.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"3⤵PID:2212
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" start notepad.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\system32\notepad.exe"3⤵PID:1288
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
Filesize
15KB
MD5fb3d090724cad152b94b97751c4831d3
SHA1870bdb9d5e976ca69354276c313440f55cb2fe9e
SHA256415b8534e2c15519f972f1d1b3d3a20227b5f0065dba80d0ebc71b4b7767b1a9
SHA5125b9c90e9c577b948d41cfd2447f74268da9754bd31be8fc292808e79823a7aa32b7d251c3e7743da34e2f9bee166d611738fa4fe2174b1fbb3856e90fba893d7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82