Analysis

  • max time kernel
    132s
  • max time network
    142s
  • resource
    win7v191014

General

  • Target

    084e772f4891b7047ce98b2fe70d9472ed7afbc36477ada6d5a7b589042f3d8e

  • Sample

    191025-f6pl6zcd7e

  • SHA256

    084e772f4891b7047ce98b2fe70d9472ed7afbc36477ada6d5a7b589042f3d8e

Score
N/A

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\084e772f4891b7047ce98b2fe70d9472ed7afbc36477ada6d5a7b589042f3d8e.exe
    "C:\Users\Admin\AppData\Local\Temp\084e772f4891b7047ce98b2fe70d9472ed7afbc36477ada6d5a7b589042f3d8e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    PID:1300
  • C:\Users\Admin\AppData\Local\Temp\084e772f4891b7047ce98b2fe70d9472ed7afbc36477ada6d5a7b589042f3d8e.exe
    "C:\Users\Admin\AppData\Local\Temp\084e772f4891b7047ce98b2fe70d9472ed7afbc36477ada6d5a7b589042f3d8e.exe"
    1⤵
    • Modifies system certificate store
    PID:1960

Network

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Additional techniques

  • T1130

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1960-0-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/1960-1-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB