Analysis

  • max time kernel
    148s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 17:44

General

  • Target

    99.exe

  • Size

    2.0MB

  • MD5

    31dd671d3aceab33bccb2f206ad4bf0f

  • SHA1

    e8915bdc95e075c90816de5ff7dbda3f65c79ca8

  • SHA256

    626ba93e37340cf76db45d4d05926ccfcc4f9e8bcc7c6628054843944042a0fb

  • SHA512

    beeee1d9c9ada7f0cb83f5cfe602ca1483e4a3c2679a5fe4090aa08eda5ed99e33cf247b512176c6bef1a8924b8495bb9af5a096919ac6dd890c509a417a3288

  • SSDEEP

    49152:OIRlp97ZF1KBl6bBjuyFWANKQ8yE8OEBhn:t1q6btuyBybE

Score
1/10

Malware Config

Signatures

  • Kills process with taskkill 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99.exe
    "C:\Users\Admin\AppData\Local\Temp\99.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im ÉϺÅÆ÷.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im ÉϺÅÆ÷.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2832
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im ÉϺÅÆ÷.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im ÉϺÅÆ÷.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2724
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im ÉϺÅÆ÷.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im ÉϺÅÆ÷.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2896
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im ÉϺÅÆ÷.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im ÉϺÅÆ÷.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2720
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im ÉϺÅÆ÷.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im ÉϺÅÆ÷.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2968
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im ÉϺÅÆ÷.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im ÉϺÅÆ÷.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2860
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c taskkill /im ÉϺÅÆ÷.exe /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im ÉϺÅÆ÷.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2864

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2208-0-0x00000000001A0000-0x00000000001E1000-memory.dmp

    Filesize

    260KB

  • memory/2208-7-0x00000000001A0000-0x00000000001E1000-memory.dmp

    Filesize

    260KB