Analysis
-
max time kernel
65s -
max time network
126s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-11-2020 06:05
Static task
static1
Behavioral task
behavioral1
Sample
8f62ed60962df60d1d11c6e2a97a3a6e.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
8f62ed60962df60d1d11c6e2a97a3a6e.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
8f62ed60962df60d1d11c6e2a97a3a6e.exe
-
Size
671KB
-
MD5
8f62ed60962df60d1d11c6e2a97a3a6e
-
SHA1
d7a80002dba75d642cd05f094110e147541f2058
-
SHA256
df25322be14f617652607a150c806b4ecb3a3317564755518b8100063b58a50e
-
SHA512
3b8b5dcf317eb0a5dd061832fa8bc6eb6b1aa290104423b02c3e9b6cd4a5744c1922010478603b545470f303ee4eb65f17d494a5e222b382cd922a7fd75f7080
Score
8/10
Malware Config
Signatures
-
Blacklisted process makes network request 6 IoCs
Processes:
cmd.exeflow pid process 30 1956 cmd.exe 32 1956 cmd.exe 34 1956 cmd.exe 35 1956 cmd.exe 36 1956 cmd.exe 37 1956 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8f62ed60962df60d1d11c6e2a97a3a6e.exedescription pid process target process PID 676 set thread context of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe -
Suspicious use of WriteProcessMemory 851 IoCs
Processes:
8f62ed60962df60d1d11c6e2a97a3a6e.exedescription pid process target process PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe PID 676 wrote to memory of 1956 676 8f62ed60962df60d1d11c6e2a97a3a6e.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f62ed60962df60d1d11c6e2a97a3a6e.exe"C:\Users\Admin\AppData\Local\Temp\8f62ed60962df60d1d11c6e2a97a3a6e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe2⤵
- Blacklisted process makes network request
-
C:\Users\Admin\AppData\Local\Temp\8f62ed60962df60d1d11c6e2a97a3a6e.exeC:\Users\Admin\AppData\Local\Temp\8f62ed60962df60d1d11c6e2a97a3a6e.exe 36449469421⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/504-3-0x00000000020F0000-0x000000000211C000-memory.dmpFilesize
176KB
-
memory/676-0-0x0000000000510000-0x000000000053C000-memory.dmpFilesize
176KB
-
memory/676-1-0x0000000000540000-0x000000000056C000-memory.dmpFilesize
176KB
-
memory/1956-5-0x00007FF7E2F5DA28-mapping.dmp
-
memory/1956-4-0x00007FF7E2F40000-0x00007FF7E2F84000-memory.dmpFilesize
272KB
-
memory/1956-6-0x00007FF7E2F40000-0x00007FF7E2F84000-memory.dmpFilesize
272KB