Analysis

  • max time kernel
    54s
  • max time network
    6s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    09/07/2020, 18:45

General

  • Target

    a6196179c44372989a82cd3bc60a87262a4bb6a583f6aa38789b4ecafbe5c7b8.exe

  • Size

    948KB

  • MD5

    c57bc62ab9bcd1bc57255e8c642cc7b1

  • SHA1

    7318f32a0ab34600640c96f19338891925107419

  • SHA256

    a6196179c44372989a82cd3bc60a87262a4bb6a583f6aa38789b4ecafbe5c7b8

  • SHA512

    deaeac6e7b3802bada13de35e09bd7485a3af8654ea5b39cc7185af181b1f06fd29997433203516c945df01f49020817706d58da47819e34e73fde7beaf23b13

Score
7/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 20 IoCs
  • Deletes itself 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6196179c44372989a82cd3bc60a87262a4bb6a583f6aa38789b4ecafbe5c7b8.exe
    "C:\Users\Admin\AppData\Local\Temp\a6196179c44372989a82cd3bc60a87262a4bb6a583f6aa38789b4ecafbe5c7b8.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1496
    • C:\Windows\SysWOW64\extrac32.exe
      extrac32 C:\Users\Admin\AppData\Local\Temp\jus47DA.tmp /L "C:\Users\Public\ODBC\ODBC0\"
      2⤵
        PID:1860
      • C:\Windows\SysWOW64\net.exe
        net start AppMgmt
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 start AppMgmt
          3⤵
            PID:1936
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\TpTemp\lgt4923.tmp.cmd
          2⤵
          • Suspicious use of WriteProcessMemory
          • Deletes itself
          PID:1904
          • C:\Windows\SysWOW64\chcp.com
            chcp 1252
            3⤵
              PID:1952

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads