Analysis

  • max time kernel
    144s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    13/07/2020, 06:34

General

  • Target

    1a6014d5372cb9cc90f6fcd84e85a0b5.exe

  • Size

    1.3MB

  • MD5

    1a6014d5372cb9cc90f6fcd84e85a0b5

  • SHA1

    d12df5828471f094c7a268c9564ddc7ea19a4540

  • SHA256

    419fdd95959d3b4a086ad9009775e08bde4867593bffc22e05e19d89606698f4

  • SHA512

    e2afb15977c7f43ba0b82509a3651b9d085ed11bcc0c8113527b001f5df78a1dad0384e157f132e57ce4975da357c08234eb135dbfd7aa2f043935a7a4bf9af0

Score
8/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 18 IoCs
  • Loads dropped DLL 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Drops startup file 2 IoCs
  • NTFS ADS 1 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a6014d5372cb9cc90f6fcd84e85a0b5.exe
    "C:\Users\Admin\AppData\Local\Temp\1a6014d5372cb9cc90f6fcd84e85a0b5.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Loads dropped DLL
    • Drops startup file
    • NTFS ADS
    • Adds Run entry to start application
    PID:1312
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell Add-MpPreference -ExclusionPath C:\
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      PID:1764
    • C:\ProgramData\images.exe
      "C:\ProgramData\images.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:1804
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell Add-MpPreference -ExclusionPath C:\
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        PID:1324
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe"
        3⤵
          PID:1516

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1312-0-0x0000000000670000-0x00000000007C3000-memory.dmp

            Filesize

            1.3MB

          • memory/1516-15-0x0000000000170000-0x0000000000171000-memory.dmp

            Filesize

            4KB

          • memory/1804-8-0x0000000000790000-0x00000000008E3000-memory.dmp

            Filesize

            1.3MB