Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    14/07/2020, 15:07

General

  • Target

    RUN ME.exe

  • Size

    888KB

  • MD5

    323c3c28b793f084ede6cb8becb4c4d2

  • SHA1

    ca2bceb5658be20cbe08ca96a32dcccb22b98dcc

  • SHA256

    8a5c7b6b363eaeff989b00c2664a92831b00133064339208f69d050ff55f004a

  • SHA512

    376bc71a467060c5378a659ed5d21b96e1a18f6cb551e9a93cf290a2a6057e3a7fb0be0c4a9a01d0485dca0bc8450dd7228407ef1e51502efe9c9c13f0f55d44

Score
1/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Checks whether UAC is enabled 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Modifies system certificate store 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RUN ME.exe
    "C:\Users\Admin\AppData\Local\Temp\RUN ME.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3008
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetWindowsHookEx
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    PID:3024
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:82945 /prefetch:2
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Checks whether UAC is enabled
      • Modifies Internet Explorer settings
      PID:1964

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads