Analysis

  • max time kernel
    147s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    08-07-2020 08:23

General

  • Target

    a59495fd47a8bb187c6e2cd9953e14a0.exe

  • Size

    872KB

  • MD5

    a59495fd47a8bb187c6e2cd9953e14a0

  • SHA1

    a8f89bc4231d002227191603116808b7df11f9df

  • SHA256

    7510841337a460d3848fac1c9e0977992d9b8098a7444117bdc3d00e7c3a30f3

  • SHA512

    482f09758dfba61d994ed8d4e23ff8008f676faf27234b516ad834cd7e58f735fb39f4e69c7be355e1d757866846148b6e57d076714eec8ceca3d980c6295519

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe
    "C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe
      "{path}"
      2⤵
        PID:1684
      • C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe
        "{path}"
        2⤵
          PID:1336
        • C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe
          "{path}"
          2⤵
            PID:1364
          • C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe
            "{path}"
            2⤵
              PID:1224
            • C:\Users\Admin\AppData\Local\Temp\a59495fd47a8bb187c6e2cd9953e14a0.exe
              "{path}"
              2⤵
                PID:1796

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads