Analysis

  • max time kernel
    54s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    16-07-2020 18:30

General

  • Target

    Request For New Order05.com.exe

  • Size

    701KB

  • MD5

    df440b940c5398f756ed55785c9307a8

  • SHA1

    9d189e6c51bc1cb9ff860eb4d8a0c9aef6487aee

  • SHA256

    cf60dd8e927a419d76dfb060c649c888dacc338cc14b5e3abf5e388213fec520

  • SHA512

    25cbb6a786d4405d464506659eadd946ca8f604c086898ae0cb0b05d0139b608f3ffdb365d1ec55aec2f4acb03f3c74321188cff12aa9456770851fbdee1ea74

Score
6/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Request For New Order05.com.exe
    "C:\Users\Admin\AppData\Local\Temp\Request For New Order05.com.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 7388
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: EnumeratesProcesses
      • Program crash
      PID:1820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1820-1-0x0000000002260000-0x0000000002271000-memory.dmp

    Filesize

    68KB

  • memory/1820-2-0x0000000002710000-0x0000000002721000-memory.dmp

    Filesize

    68KB