Analysis

  • max time kernel
    53s
  • max time network
    66s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    30-06-2020 06:56

General

  • Target

    c8c3bc6c01dee147be04e3fbaeb5ff72fbee21e676ba04b7326738e692cec9d0.exe

  • Size

    1.6MB

  • MD5

    372e453ee2f834493417fe5aea1ba23e

  • SHA1

    a7597474eeb9506030d36dbd7fc8d015a50cac8b

  • SHA256

    c8c3bc6c01dee147be04e3fbaeb5ff72fbee21e676ba04b7326738e692cec9d0

  • SHA512

    1f6bd250f321555495289d147a23a9d39eff2c3695ffe575211ca849e4fb128838112cbf5076e37155dc1a4cab596b4290e3570b63ec81dd522fa7b914f9fd31

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8c3bc6c01dee147be04e3fbaeb5ff72fbee21e676ba04b7326738e692cec9d0.exe
    "C:\Users\Admin\AppData\Local\Temp\c8c3bc6c01dee147be04e3fbaeb5ff72fbee21e676ba04b7326738e692cec9d0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:1156
    • C:\Users\Admin\AppData\Local\Temp\c8c3bc6c01dee147be04e3fbaeb5ff72fbee21e676ba04b7326738e692cec9d0.exe
      "{path}"
      2⤵
        PID:1432
      • C:\Users\Admin\AppData\Local\Temp\c8c3bc6c01dee147be04e3fbaeb5ff72fbee21e676ba04b7326738e692cec9d0.exe
        "{path}"
        2⤵
          PID:1444
        • C:\Users\Admin\AppData\Local\Temp\c8c3bc6c01dee147be04e3fbaeb5ff72fbee21e676ba04b7326738e692cec9d0.exe
          "{path}"
          2⤵
            PID:316
          • C:\Users\Admin\AppData\Local\Temp\c8c3bc6c01dee147be04e3fbaeb5ff72fbee21e676ba04b7326738e692cec9d0.exe
            "{path}"
            2⤵
              PID:1456
            • C:\Users\Admin\AppData\Local\Temp\c8c3bc6c01dee147be04e3fbaeb5ff72fbee21e676ba04b7326738e692cec9d0.exe
              "{path}"
              2⤵
                PID:1528

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1156-1-0x0000000000000000-0x0000000000000000-disk.dmp