Analysis
-
max time kernel
146s -
max time network
101s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
09-07-2020 07:05
Static task
static1
Behavioral task
behavioral1
Sample
65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exe
-
Size
152KB
-
MD5
f204d0d0d3581410ab737e7df7127707
-
SHA1
9f4bd70cd0705bd2101df3da185ca20c8cc889de
-
SHA256
65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e
-
SHA512
97788803ca26b63cc442bf99d5d44c3550eb30eb368c88b657760e2e3c56c3e8e65df38cad4c7ecc17b9a15734832b1be6daf6c54ce85fe07a0e1cf7f33f5554
Score
8/10
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exepid process 904 65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exedescription pid process target process PID 904 wrote to memory of 1408 904 65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exe bdif.exe PID 904 wrote to memory of 1408 904 65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exe bdif.exe PID 904 wrote to memory of 1408 904 65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exe bdif.exe PID 904 wrote to memory of 1408 904 65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exe bdif.exe -
Executes dropped EXE 1 IoCs
Processes:
bdif.exepid process 1408 bdif.exe -
NTFS ADS 1 IoCs
Processes:
65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exedescription ioc process File created \??\c:\programdata\e6533cd889\bdif.exe:Zone.Identifier 65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exe"C:\Users\Admin\AppData\Local\Temp\65c4054e6fbe8b99c6c340047f42728c1b9713b3c7ebfebe8949966de010ae2e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
- NTFS ADS
-
\??\c:\programdata\e6533cd889\bdif.exec:\programdata\e6533cd889\bdif.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\83bb50ad72ec066ba3b2332b06c6d86c
-
C:\ProgramData\e6533cd889\bdif.exe
-
\ProgramData\e6533cd889\bdif.exe
-
memory/904-0-0x0000000000230000-0x0000000000240000-memory.dmpFilesize
64KB
-
memory/904-1-0x0000000000270000-0x0000000000295000-memory.dmpFilesize
148KB
-
memory/1408-3-0x0000000000000000-mapping.dmp
-
memory/1408-5-0x0000000000030000-0x0000000000040000-memory.dmpFilesize
64KB
-
memory/1408-6-0x00000000003D0000-0x00000000003F5000-memory.dmpFilesize
148KB