Analysis
-
max time kernel
6s -
max time network
73s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
29-06-2020 07:16
Static task
static1
Behavioral task
behavioral1
Sample
e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
General
-
Target
e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe
-
Size
1.5MB
-
MD5
5816664a5c053695f23ad38ad293f67b
-
SHA1
b4cc8feb33b1d46c203d57e263e25991fe506d35
-
SHA256
e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2
-
SHA512
8a4a807495dc6624fdf64aea279cc1d8d0da6a4c75ba098d6ae46729fbab98ec316ab8325dc53ee58c45beb17194384ce3d9baaee8c44cf2703fd0a4bb6c64e5
Score
8/10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1784-34-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1784-38-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1784-40-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exedescription pid process target process PID 676 set thread context of 1348 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe svchost.exe PID 676 set thread context of 1784 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe 1348 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exesvchost.exee7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exepid process 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe 1348 svchost.exe 1784 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exedescription pid process target process PID 676 wrote to memory of 1348 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe svchost.exe PID 676 wrote to memory of 1348 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe svchost.exe PID 676 wrote to memory of 1348 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe svchost.exe PID 676 wrote to memory of 1348 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe svchost.exe PID 676 wrote to memory of 1348 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe svchost.exe PID 676 wrote to memory of 1348 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe svchost.exe PID 676 wrote to memory of 1348 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe svchost.exe PID 676 wrote to memory of 1348 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe svchost.exe PID 676 wrote to memory of 1348 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe svchost.exe PID 676 wrote to memory of 1348 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe svchost.exe PID 676 wrote to memory of 1784 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe PID 676 wrote to memory of 1784 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe PID 676 wrote to memory of 1784 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe PID 676 wrote to memory of 1784 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe PID 676 wrote to memory of 1784 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe PID 676 wrote to memory of 1784 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe PID 676 wrote to memory of 1784 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe PID 676 wrote to memory of 1784 676 e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe"C:\Users\Admin\AppData\Local\Temp\e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe"C:\Users\Admin\AppData\Local\Temp\e7889ba1ad4c31188004c19fe230e62c6433cb89e5b3c305d82cc3d454f69ff2.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1784
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/676-22-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-9-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-4-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-2-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-6-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-7-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-8-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-23-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-10-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-11-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-12-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-13-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-16-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-24-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-18-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-19-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-5-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-3-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-17-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-25-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-26-0x0000000000298000-0x0000000000299000-memory.dmpFilesize
4KB
-
memory/676-27-0x0000000000298000-0x0000000000299000-memory.dmpFilesize
4KB
-
memory/676-28-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-29-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/676-30-0x0000000000296000-0x0000000000297000-memory.dmpFilesize
4KB
-
memory/1348-31-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1348-32-0x000000000040B000-mapping.dmp
-
memory/1348-33-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1348-36-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1784-34-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1784-35-0x00000000004085D0-mapping.dmp
-
memory/1784-38-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1784-40-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB