Analysis

  • max time kernel
    83s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    09/07/2020, 10:15

General

  • Target

    697a4078312b404ceaa6dd072245f20b093c0272f751d9fb67d3d71ada632b18.exe

  • Size

    152KB

  • MD5

    37656f778382768613dde3b7167327e3

  • SHA1

    60da8746b0efe12d33a13038cdc860d927918e83

  • SHA256

    697a4078312b404ceaa6dd072245f20b093c0272f751d9fb67d3d71ada632b18

  • SHA512

    56bcd6cf8a00ad0cdadf9c49f33a0801d9768eff65153423c854fae6aa55859dd250046687ffbfdeef43569df311786be29c095e9ccd41dfecc7a816e16f1200

Score
8/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs
  • Executes dropped EXE 1 IoCs
  • NTFS ADS 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\697a4078312b404ceaa6dd072245f20b093c0272f751d9fb67d3d71ada632b18.exe
    "C:\Users\Admin\AppData\Local\Temp\697a4078312b404ceaa6dd072245f20b093c0272f751d9fb67d3d71ada632b18.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • NTFS ADS
    PID:1536
    • \??\c:\programdata\e6533cd889\bdif.exe
      c:\programdata\e6533cd889\bdif.exe
      2⤵
      • Executes dropped EXE
      PID:2328

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1536-0-0x00000000001D0000-0x00000000001E0000-memory.dmp

          Filesize

          64KB

        • memory/1536-1-0x00000000005B0000-0x00000000005D5000-memory.dmp

          Filesize

          148KB

        • memory/2328-6-0x0000000000690000-0x00000000006B5000-memory.dmp

          Filesize

          148KB