Analysis

  • max time kernel
    143s
  • max time network
    57s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    02-08-2020 09:05

General

  • Target

    bb1af121502e40a549135b72f34ad49d11cfbfa49b5cbcf549777549087fe751.dll

  • Size

    258KB

  • MD5

    9070256c0531a143da6ee6697b5aa352

  • SHA1

    54f313419abe2dd153b7d2e66f8270b2a459cd13

  • SHA256

    bb1af121502e40a549135b72f34ad49d11cfbfa49b5cbcf549777549087fe751

  • SHA512

    f9e22d2f730a699c4cde38b6bb35b16733864e17d3de109a667ebc3e8e057f6778ae5a62f597ffbde936cc8fc8b075814012890058364ee4a86ebb8649eeac40

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
    1⤵
    • Deletes itself
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2356
  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bb1af121502e40a549135b72f34ad49d11cfbfa49b5cbcf549777549087fe751.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2584

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2356-0-0x0000020070540000-0x0000020070587000-memory.dmp
    Filesize

    284KB

  • memory/2356-1-0x0000020070540000-0x0000020070587000-memory.dmp
    Filesize

    284KB

  • memory/2356-2-0x0000020070540000-0x0000020070587000-memory.dmp
    Filesize

    284KB

  • memory/2356-3-0x0000020070540000-0x0000020070587000-memory.dmp
    Filesize

    284KB

  • memory/2356-4-0x0000020070540000-0x0000020070587000-memory.dmp
    Filesize

    284KB

  • memory/2356-5-0x0000020070540000-0x0000020070587000-memory.dmp
    Filesize

    284KB

  • memory/2356-6-0x0000020070540000-0x0000020070587000-memory.dmp
    Filesize

    284KB