Analysis

  • max time kernel
    54s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    31-07-2020 10:05

General

  • Target

    BL draft FORM_xls.exe

  • Size

    762KB

  • MD5

    99996216855c81d9cc40d112468cfc26

  • SHA1

    76e36c04c6fc6fd81a35b777df3f7c24feae524a

  • SHA256

    7b8df140852947533df21149c9bcb88be9cf040440dfb8f5eb7140171d67ce52

  • SHA512

    82aec45d3f0545e5639a075991fcc303258c64baf9653b7d45554fc9ba88de8cb6f9b9b15cfc9c2308ec798457494429ec2fbf8cb17565b36940ecaa5bd28789

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BL draft FORM_xls.exe
    "C:\Users\Admin\AppData\Local\Temp\BL draft FORM_xls.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Users\Admin\AppData\Local\Temp\BL draft FORM_xls.exe
      "{path}"
      2⤵
        PID:1864
      • C:\Users\Admin\AppData\Local\Temp\BL draft FORM_xls.exe
        "{path}"
        2⤵
          PID:1872
        • C:\Users\Admin\AppData\Local\Temp\BL draft FORM_xls.exe
          "{path}"
          2⤵
            PID:1400
          • C:\Users\Admin\AppData\Local\Temp\BL draft FORM_xls.exe
            "{path}"
            2⤵
              PID:1904
            • C:\Users\Admin\AppData\Local\Temp\BL draft FORM_xls.exe
              "{path}"
              2⤵
                PID:1912

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads