Analysis

  • max time kernel
    60s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    15-07-2020 15:52

General

  • Target

    Doc-Preview.exe

  • Size

    425KB

  • MD5

    f5b7ebf0221bd55dbda661eefde1d958

  • SHA1

    ebbd293fb26da47cdfbc47b55371de2772faa5ac

  • SHA256

    66fe4f89b6a5408851c16d7af393e97969e8712d5e7300a75e54c86ad33d1060

  • SHA512

    3c94d1f492fde84a3ae142349916c874db5b2b53b7755b9de74122ca5aba2801ca0e7185a2df433090c86039354ab2cf31a394337d086705b1a280a97ccda2c7

Score
8/10

Malware Config

Signatures

  • Blacklisted process makes network request 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of WriteProcessMemory 842 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Doc-Preview.exe
    "C:\Users\Admin\AppData\Local\Temp\Doc-Preview.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Users\Admin\AppData\Local\Temp\1A60.exe
      C:\Users\Admin\AppData\Local\Temp\1A60.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of SetThreadContext
      PID:1848
      • C:\Windows\system32\cmd.exe
        cmd.exe
        3⤵
        • Blacklisted process makes network request
        PID:1548
  • C:\Users\Admin\AppData\Local\Temp\Doc-Preview.exe
    C:\Users\Admin\AppData\Local\Temp\Doc-Preview.exe {A886167F-8244-4EB2-BDE2-D25926E5F215}
    1⤵
      PID:1984
    • C:\Users\Admin\AppData\Local\Temp\1A60.exe
      C:\Users\Admin\AppData\Local\Temp\1A60.exe {B2BE488C-A957-4230-A4A2-E5A518D3C5BA}
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1256

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1256-17-0x00000000003C0000-0x00000000003FF000-memory.dmp

      Filesize

      252KB

    • memory/1296-0-0x0000000000210000-0x000000000024F000-memory.dmp

      Filesize

      252KB

    • memory/1548-11-0x000000004A790000-0x000000004A7EA000-memory.dmp

      Filesize

      360KB

    • memory/1548-9-0x000000004A790000-0x000000004A7EA000-memory.dmp

      Filesize

      360KB

    • memory/1848-6-0x0000000001D50000-0x0000000001D8F000-memory.dmp

      Filesize

      252KB

    • memory/1984-13-0x0000000000310000-0x000000000034F000-memory.dmp

      Filesize

      252KB