Analysis

  • max time kernel
    153s
  • max time network
    160s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    29-07-2020 07:17

General

  • Target

    1369d06d493f805f55b4062437cfbcd9abec14c5ccb43189a0820bae280297e3.exe

  • Size

    172KB

  • MD5

    169aaafbcc45bcc0ad01ccf74df8f5a8

  • SHA1

    e8e922317325d2527ef75a35d16407d5f671f6cb

  • SHA256

    1369d06d493f805f55b4062437cfbcd9abec14c5ccb43189a0820bae280297e3

  • SHA512

    f4f4dc28aae507535d5b71fb092a2e9e0a0e3a3e463f9e17a9dee4214655bfb2900ec6b6eb0b8453418f0ae3bd51c2c2d08638baac0d8ce3f1cfeb43b8759461

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies registry class 14 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1369d06d493f805f55b4062437cfbcd9abec14c5ccb43189a0820bae280297e3.exe
    "C:\Users\Admin\AppData\Local\Temp\1369d06d493f805f55b4062437cfbcd9abec14c5ccb43189a0820bae280297e3.exe"
    1⤵
    • Modifies registry class
    • Adds Run key to start application
    PID:336
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {9EEA5741-3B61-407E-BC7D-3AE1359B1427} S-1-5-21-2090973689-680783404-4292415065-1000:UCQFZDUI\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Roaming\ZeVEgNqF\oqNBEsBn\LDIQpmFW\TtADeDpGO.exe
      C:\Users\Admin\AppData\Roaming\ZeVEgNqF\oqNBEsBn\LDIQpmFW\TtADeDpGO.exe
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:1896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads