Analysis

  • max time kernel
    9s
  • max time network
    13s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-11-2020 17:54

General

  • Target

    ef797fafff1b59918b8ce2900183d59cd77d2e70efee4062c1c4a69ce6a990cd.exe

  • Size

    238KB

  • MD5

    f5f86b762cc6bff03cc5a7a7266d9bca

  • SHA1

    c295fb12ad2eaf35230a9f3f4d7f254b65c4d6d7

  • SHA256

    ef797fafff1b59918b8ce2900183d59cd77d2e70efee4062c1c4a69ce6a990cd

  • SHA512

    5d1adc85691544781fad2c6e92450ccbcc425fbce26b331b04538372277b7411a4c99a7df5157d685782ec5580c17943805aca09e74c1e39c550fa8314221226

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef797fafff1b59918b8ce2900183d59cd77d2e70efee4062c1c4a69ce6a990cd.exe
    "C:\Users\Admin\AppData\Local\Temp\ef797fafff1b59918b8ce2900183d59cd77d2e70efee4062c1c4a69ce6a990cd.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\ef797fafff1b59918b8ce2900183d59cd77d2e70efee4062c1c4a69ce6a990cd.exe
      C:\Users\Admin\AppData\Local\Temp\ef797fafff1b59918b8ce2900183d59cd77d2e70efee4062c1c4a69ce6a990cd.exe --stat dwnldr/p=8981/fail=1
      2⤵
        PID:1728

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1728-1-0x0000000000000000-mapping.dmp
    • memory/1996-0-0x000007FEF7500000-0x000007FEF777A000-memory.dmp
      Filesize

      2.5MB