Resubmissions

27-09-2020 00:33

200927-n2q2v3n43s 6

10-09-2020 08:49

200910-c8x1yrxskj 10

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    27-09-2020 00:33

General

  • Target

    e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe

  • Size

    379KB

  • MD5

    9f00d78f2e8e4523773a264f85be1c02

  • SHA1

    3c542144a7a03134060bd666206a106bcea95e5a

  • SHA256

    e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e

  • SHA512

    5760967703d0702d4c855b75c895a2432c809ca8f945f2a80914f21b3c8129c4bbf155bac4bb5fa6b03e868b3d33cfbe1b3321a7b438741cd62d1c3323d38928

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe
    "C:\Users\Admin\AppData\Local\Temp\e390ab08f852845fccc07d234a96f51fcb23a95a4fa872a22b48afa0cbb0941e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Windows\system32\cmd.exe
      cmd /c TIMEOUT /T 50 /NOBREAK && move "C:\Users\Admin\AppData\Local\Temp\iymvtslqhs" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Control Panel.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Windows\system32\timeout.exe
        TIMEOUT /T 50 /NOBREAK
        3⤵
        • Delays execution with timeout.exe
        PID:1584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\iymvtslqhs

  • memory/1048-0-0x0000000001E40000-0x0000000001E73000-memory.dmp

    Filesize

    204KB

  • memory/1048-1-0x0000000001E90000-0x0000000001EC2000-memory.dmp

    Filesize

    200KB

  • memory/1584-3-0x0000000000000000-mapping.dmp

  • memory/1608-2-0x0000000000000000-mapping.dmp