Analysis

  • max time kernel
    134s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-11-2020 19:50

General

  • Target

    SecuriteInfo.com.BehavesLike.Win32.Generic.wc.26773.exe

  • Size

    3.9MB

  • MD5

    2f485931b93476f0c395a2b8a14bbad2

  • SHA1

    e07ee281b0175ce23d93145d583fc9da038ec7e6

  • SHA256

    37c78d45542b2109dcf160591e570469946ffcdfb5042cede4671eef5543c5c9

  • SHA512

    f131c01ecdd153732e79e1d996d57a1aaff073f9844b1a5615c1990b730e67ae614e7fca7a00d48e2971d5b016ab7a82104890c657f1cb792bfa7f13f3d2b112

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.wc.26773.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.wc.26773.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4756
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.wc.26773.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.wc.26773.exe"
      2⤵
        PID:1144
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s seclogon
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1048

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1144-3-0x0000000000000000-mapping.dmp
    • memory/4756-1-0x0000000005430000-0x0000000005431000-memory.dmp
      Filesize

      4KB

    • memory/4756-2-0x0000000000400000-0x0000000000B10000-memory.dmp
      Filesize

      7.1MB