Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    19-07-2020 17:33

General

  • Target

    uncategorized_1.2.0.1.vir.exe

  • Size

    304KB

  • MD5

    a0173bd7d459e734f3417e40e612bb0c

  • SHA1

    f107596acaa9e7a0916a46a68db923e3ab228be1

  • SHA256

    f06047b09abc77529969c5949deda36ff154539d1b9ed8942c22fbb307d8aac9

  • SHA512

    310fff512b750c5eab7361c1c23906d78353d8443fe0c95454e0ff9afce930f183ad37c3ac8ba8bb1ce8428443929a32d47ec641279272b96e60d6df96c0674b

Score
5/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops autorun.inf file 1 TTPs

    Malware can abuse Windows Autorun to spread further via attached volumes.

Processes

  • C:\Users\Admin\AppData\Local\Temp\uncategorized_1.2.0.1.vir.exe
    "C:\Users\Admin\AppData\Local\Temp\uncategorized_1.2.0.1.vir.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    PID:4024
    • C:\Users\Admin\AppData\Local\Temp\uncategorized_1.2.0.1.vir.exe
      "C:\Users\Admin\AppData\Local\Temp\uncategorized_1.2.0.1.vir.exe"
      2⤵
        PID:2088

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Initial Access

    Replication Through Removable Media

    1
    T1091

    Lateral Movement

    Replication Through Removable Media

    1
    T1091

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2088-0-0x0000000000400000-0x0000000000427000-memory.dmp
      Filesize

      156KB

    • memory/2088-1-0x0000000000415D3E-mapping.dmp
    • memory/2088-2-0x0000000000400000-0x0000000000427000-memory.dmp
      Filesize

      156KB