Analysis

  • max time kernel
    70s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    08-07-2020 07:17

General

  • Target

    DHL AWB #7849402748,pdf.exe

  • Size

    5.6MB

  • MD5

    9a099cecae30cc98f819f1724c2f2a82

  • SHA1

    e4c1308358cf300d092d2d0a9927180890ec951f

  • SHA256

    b0b358f5e0f4bfb12abe5066a9083f881c3b9c501029d9ce45416d36eb2e866c

  • SHA512

    caa53a4c53ee9645a29a11d4c37a7af9fa4e456a49581d4616c8520f0fe2db9c5c66e2353ced397c322c3bdf4a284981f49b17601bea27e2345b567b8774a0d7

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DHL AWB #7849402748,pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\DHL AWB #7849402748,pdf.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2892
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 948
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3860

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3860-0-0x0000000004C80000-0x0000000004C81000-memory.dmp

    Filesize

    4KB

  • memory/3860-1-0x0000000004C80000-0x0000000004C81000-memory.dmp

    Filesize

    4KB

  • memory/3860-3-0x00000000053C0000-0x00000000053C1000-memory.dmp

    Filesize

    4KB