Analysis

  • max time kernel
    139s
  • max time network
    115s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-11-2020 19:50

General

  • Target

    SecuriteInfo.com.BehavesLike.Win32.Generic.wc.23279.exe

  • Size

    3.9MB

  • MD5

    ce5e901fe35f98407ed9dbecc53f2069

  • SHA1

    9752f3265efcfa1c9bdd12875cbf9794d33c9ea4

  • SHA256

    4a7a38302fddb6caa7d4c380fb14cda9c57bdd2f1b7c97fb88d155fab76d63df

  • SHA512

    c36cc4369bedbeeeba5b795887dc22b93512c1aac09bb1700522e5766480514e24e1ddc88b3f179e0b7a5a5c186e33924e884376c81251e07f6a1d201a020aea

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.wc.23279.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.wc.23279.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:428
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.wc.23279.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.wc.23279.exe"
      2⤵
        PID:2296
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s seclogon
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1328

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/428-1-0x00000000051B0000-0x00000000051B1000-memory.dmp
      Filesize

      4KB

    • memory/428-2-0x0000000000400000-0x0000000000B10000-memory.dmp
      Filesize

      7.1MB

    • memory/2296-3-0x0000000000000000-mapping.dmp