Analysis

  • max time kernel
    128s
  • max time network
    101s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    08-06-2020 16:55

General

  • Target

    z7ZJdF1SfMKAp6L.exe

  • Size

    397KB

  • MD5

    e1939d61d59909862e2b058d96fe0789

  • SHA1

    f95a110dee743c3d33aa737fbb164c7148c9248c

  • SHA256

    a4b07204b33173093041072e00e88d0083c88b88f634561aabe46ec8992f9332

  • SHA512

    58063d064a8cd919ef59e9a5d5989ffd615e6d1905291f84864a0684d45772abbbd19701251bd5790df7a28969229df219f8ac038033bab3f99250b475adc769

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\z7ZJdF1SfMKAp6L.exe
    "C:\Users\Admin\AppData\Local\Temp\z7ZJdF1SfMKAp6L.exe"
    1⤵
      PID:1828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 1172
        2⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:2424

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2424-0-0x0000000004C50000-0x0000000004C51000-memory.dmp

      Filesize

      4KB

    • memory/2424-1-0x0000000005580000-0x0000000005581000-memory.dmp

      Filesize

      4KB