Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 12:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
USystem.exe
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
USystem.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
USystem.exe
-
Size
717KB
-
MD5
52e3c254b42572659e8ad466f9d1ef46
-
SHA1
08db8279d550e590c1fb672b33825fa0cc33b19e
-
SHA256
e26b8fb8818391ee573bb87fb2d05eec3b7cf3f833edc9a329ba6cb846012723
-
SHA512
a1a6dd8130fc00cd46e5d5769067f6a230754e62819dd6f23788ee660ac3cf25f3d1c55529b9332428d4a6e39ef92f3563e5bb66e03aa19dda3ac7ea441d4194
-
SSDEEP
12288:Bh1Lk70TnvjcCQUi4OfTdcSKberuwV9W5dASwQp8vPcM:dk70TrcCLiN4beKEq7IPcM
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 4604 USystem.exe Token: SeIncreaseQuotaPrivilege 4444 WMIC.exe Token: SeSecurityPrivilege 4444 WMIC.exe Token: SeTakeOwnershipPrivilege 4444 WMIC.exe Token: SeLoadDriverPrivilege 4444 WMIC.exe Token: SeSystemProfilePrivilege 4444 WMIC.exe Token: SeSystemtimePrivilege 4444 WMIC.exe Token: SeProfSingleProcessPrivilege 4444 WMIC.exe Token: SeIncBasePriorityPrivilege 4444 WMIC.exe Token: SeCreatePagefilePrivilege 4444 WMIC.exe Token: SeBackupPrivilege 4444 WMIC.exe Token: SeRestorePrivilege 4444 WMIC.exe Token: SeShutdownPrivilege 4444 WMIC.exe Token: SeDebugPrivilege 4444 WMIC.exe Token: SeSystemEnvironmentPrivilege 4444 WMIC.exe Token: SeRemoteShutdownPrivilege 4444 WMIC.exe Token: SeUndockPrivilege 4444 WMIC.exe Token: SeManageVolumePrivilege 4444 WMIC.exe Token: 33 4444 WMIC.exe Token: 34 4444 WMIC.exe Token: 35 4444 WMIC.exe Token: 36 4444 WMIC.exe Token: SeIncreaseQuotaPrivilege 4444 WMIC.exe Token: SeSecurityPrivilege 4444 WMIC.exe Token: SeTakeOwnershipPrivilege 4444 WMIC.exe Token: SeLoadDriverPrivilege 4444 WMIC.exe Token: SeSystemProfilePrivilege 4444 WMIC.exe Token: SeSystemtimePrivilege 4444 WMIC.exe Token: SeProfSingleProcessPrivilege 4444 WMIC.exe Token: SeIncBasePriorityPrivilege 4444 WMIC.exe Token: SeCreatePagefilePrivilege 4444 WMIC.exe Token: SeBackupPrivilege 4444 WMIC.exe Token: SeRestorePrivilege 4444 WMIC.exe Token: SeShutdownPrivilege 4444 WMIC.exe Token: SeDebugPrivilege 4444 WMIC.exe Token: SeSystemEnvironmentPrivilege 4444 WMIC.exe Token: SeRemoteShutdownPrivilege 4444 WMIC.exe Token: SeUndockPrivilege 4444 WMIC.exe Token: SeManageVolumePrivilege 4444 WMIC.exe Token: 33 4444 WMIC.exe Token: 34 4444 WMIC.exe Token: 35 4444 WMIC.exe Token: 36 4444 WMIC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4604 wrote to memory of 4856 4604 USystem.exe 92 PID 4604 wrote to memory of 4856 4604 USystem.exe 92 PID 4604 wrote to memory of 4856 4604 USystem.exe 92 PID 4856 wrote to memory of 4444 4856 CMD.exe 94 PID 4856 wrote to memory of 4444 4856 CMD.exe 94 PID 4856 wrote to memory of 4444 4856 CMD.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\USystem.exe"C:\Users\Admin\AppData\Local\Temp\USystem.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\CMD.exe"CMD.exe" /C wmic csproduct get UUID2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get UUID3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4444
-
-