Analysis

  • max time kernel
    130s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    29-06-2020 07:29

General

  • Target

    3a32a74e76e2844a515009139d75ec4ae6d785f5850ddcd3cf6cd1bd99604378.exe

  • Size

    283KB

  • MD5

    fb605060fe94da77d6bb788674e47c8b

  • SHA1

    573b984988b6b4cf81bb504d5e252419a71ec3f0

  • SHA256

    3a32a74e76e2844a515009139d75ec4ae6d785f5850ddcd3cf6cd1bd99604378

  • SHA512

    64936aeca875e23883cf1d5101bbba8e39220c59b7c0f7226b64e67f357fe5bb446885fa1b602a84e08529605e75909ac79aa6cf2efaff17eacab25f6a27d0e8

Score
9/10

Malware Config

Signatures

  • ServiceHost packer 20 IoCs

    Detects ServiceHost packer used for .NET malware

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Executes dropped EXE 5 IoCs
  • Modifies Installed Components in the registry 2 TTPs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 846 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2988
      • C:\Users\Admin\AppData\Local\Temp\3a32a74e76e2844a515009139d75ec4ae6d785f5850ddcd3cf6cd1bd99604378.exe
        "C:\Users\Admin\AppData\Local\Temp\3a32a74e76e2844a515009139d75ec4ae6d785f5850ddcd3cf6cd1bd99604378.exe"
        2⤵
        • Adds policy Run key to start application
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3944
        • C:\Windows\SysWOW64\explorer.exe
          explorer.exe
          3⤵
            PID:3160
            • C:\Windows\avast\avast.exe
              "C:\Windows\avast\avast.exe"
              4⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              PID:2240
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                5⤵
                  PID:748
                • C:\Windows\avast\avast.exe
                  "C:\Windows\avast\avast.exe"
                  5⤵
                  • Executes dropped EXE
                  PID:3988
              • C:\Windows\avast\avast.exe
                "C:\Windows\avast\avast.exe"
                4⤵
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious behavior: EnumeratesProcesses
                PID:3752
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  5⤵
                    PID:3740
                  • C:\Windows\avast\avast.exe
                    "C:\Windows\avast\avast.exe"
                    5⤵
                    • Executes dropped EXE
                    PID:1140
                • C:\Windows\avast\avast.exe
                  "C:\Windows\avast\avast.exe"
                  4⤵
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3960
              • C:\Program Files\Internet Explorer\iexplore.exe
                "C:\Program Files\Internet Explorer\iexplore.exe"
                3⤵
                  PID:3040
                • C:\Users\Admin\AppData\Local\Temp\3a32a74e76e2844a515009139d75ec4ae6d785f5850ddcd3cf6cd1bd99604378.exe
                  "C:\Users\Admin\AppData\Local\Temp\3a32a74e76e2844a515009139d75ec4ae6d785f5850ddcd3cf6cd1bd99604378.exe"
                  3⤵
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3980

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/3160-41-0x0000000024080000-0x00000000240E2000-memory.dmp

              Filesize

              392KB

            • memory/3944-0-0x0000000024010000-0x0000000024072000-memory.dmp

              Filesize

              392KB

            • memory/3980-99-0x0000000024160000-0x00000000241C2000-memory.dmp

              Filesize

              392KB