Analysis
-
max time kernel
4s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 20:44
Static task
static1
Behavioral task
behavioral1
Sample
6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe
Resource
win7v20201028
General
-
Target
6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe
-
Size
1.5MB
-
MD5
142ca1586ebf110c896a2081ee5b9897
-
SHA1
25675d558ee4bae0e32c78b1d150fa3a1a27666e
-
SHA256
6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604
-
SHA512
53266437a8411f8fb1ce9f5d9494de3f73b5b3c948974313b62f4f3b3ee172a092151f59c4ac622255213d31ef25a06bd6ca8654ef0557a25cc9ca0ebe4c468c
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1756-35-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1756-40-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exedescription pid process target process PID 1632 set thread context of 1684 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe svchost.exe PID 1632 set thread context of 1756 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe 1684 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exesvchost.exe6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exepid process 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe 1684 svchost.exe 1756 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exedescription pid process target process PID 1632 wrote to memory of 1684 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe svchost.exe PID 1632 wrote to memory of 1684 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe svchost.exe PID 1632 wrote to memory of 1684 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe svchost.exe PID 1632 wrote to memory of 1684 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe svchost.exe PID 1632 wrote to memory of 1684 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe svchost.exe PID 1632 wrote to memory of 1684 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe svchost.exe PID 1632 wrote to memory of 1684 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe svchost.exe PID 1632 wrote to memory of 1684 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe svchost.exe PID 1632 wrote to memory of 1684 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe svchost.exe PID 1632 wrote to memory of 1684 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe svchost.exe PID 1632 wrote to memory of 1756 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe PID 1632 wrote to memory of 1756 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe PID 1632 wrote to memory of 1756 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe PID 1632 wrote to memory of 1756 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe PID 1632 wrote to memory of 1756 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe PID 1632 wrote to memory of 1756 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe PID 1632 wrote to memory of 1756 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe PID 1632 wrote to memory of 1756 1632 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe 6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe"C:\Users\Admin\AppData\Local\Temp\6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe"C:\Users\Admin\AppData\Local\Temp\6e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1756
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\XBYMK.batMD5
92353035f01403e26aa2ff51c3963238
SHA1d13f167c73bfce23a2deab8ce7c4ce9f78759ff4
SHA2562e72a8542f8f809bfb1e4adfb481c7c5e6dc00dda7970c74692ba8d83ea0a870
SHA51274560e33477caae3c7bc13914e4ae3c6911bbcfe257b2833155c236a158db0aca17478beb9d97f648ff1ea566005260f511361771c74203195107f4e82cce7df
-
C:\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
142ca1586ebf110c896a2081ee5b9897
SHA125675d558ee4bae0e32c78b1d150fa3a1a27666e
SHA2566e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604
SHA51253266437a8411f8fb1ce9f5d9494de3f73b5b3c948974313b62f4f3b3ee172a092151f59c4ac622255213d31ef25a06bd6ca8654ef0557a25cc9ca0ebe4c468c
-
\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
142ca1586ebf110c896a2081ee5b9897
SHA125675d558ee4bae0e32c78b1d150fa3a1a27666e
SHA2566e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604
SHA51253266437a8411f8fb1ce9f5d9494de3f73b5b3c948974313b62f4f3b3ee172a092151f59c4ac622255213d31ef25a06bd6ca8654ef0557a25cc9ca0ebe4c468c
-
\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
142ca1586ebf110c896a2081ee5b9897
SHA125675d558ee4bae0e32c78b1d150fa3a1a27666e
SHA2566e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604
SHA51253266437a8411f8fb1ce9f5d9494de3f73b5b3c948974313b62f4f3b3ee172a092151f59c4ac622255213d31ef25a06bd6ca8654ef0557a25cc9ca0ebe4c468c
-
\Users\Admin\AppData\Roaming\IDM\ichader.exe
-
\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
142ca1586ebf110c896a2081ee5b9897
SHA125675d558ee4bae0e32c78b1d150fa3a1a27666e
SHA2566e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604
SHA51253266437a8411f8fb1ce9f5d9494de3f73b5b3c948974313b62f4f3b3ee172a092151f59c4ac622255213d31ef25a06bd6ca8654ef0557a25cc9ca0ebe4c468c
-
\Users\Admin\AppData\Roaming\IDM\ichader.exeMD5
142ca1586ebf110c896a2081ee5b9897
SHA125675d558ee4bae0e32c78b1d150fa3a1a27666e
SHA2566e52961bcacef0d2266611273665feee91e924e55a809e50b6a978e0a2867604
SHA51253266437a8411f8fb1ce9f5d9494de3f73b5b3c948974313b62f4f3b3ee172a092151f59c4ac622255213d31ef25a06bd6ca8654ef0557a25cc9ca0ebe4c468c
-
memory/404-51-0x0000000000000000-mapping.dmp
-
memory/816-43-0x0000000000000000-mapping.dmp
-
memory/1084-45-0x0000000000000000-mapping.dmp
-
memory/1632-27-0x0000000000698000-0x0000000000699000-memory.dmpFilesize
4KB
-
memory/1632-10-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-16-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-17-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-18-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-19-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-22-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-23-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-24-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-25-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-3-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-26-0x0000000000698000-0x0000000000699000-memory.dmpFilesize
4KB
-
memory/1632-30-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-29-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-28-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-2-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-4-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-6-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-5-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-7-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-9-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-8-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-13-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-12-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1632-11-0x0000000000696000-0x0000000000697000-memory.dmpFilesize
4KB
-
memory/1684-33-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1684-34-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1684-32-0x000000000040B000-mapping.dmp
-
memory/1684-31-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1756-40-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1756-36-0x00000000004085D0-mapping.dmp
-
memory/1756-38-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/1756-35-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB