Analysis

  • max time kernel
    135s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    09-11-2020 19:50

General

  • Target

    SecuriteInfo.com.BehavesLike.Win32.Generic.wc.21340.exe

  • Size

    3.9MB

  • MD5

    ca428635b70d5314dc97c8d22c66e0d5

  • SHA1

    1eb3b6220ec71d758761fdc36a6b579947b6b6c3

  • SHA256

    cd689e05263e010dd9c23607c7d8dee3e4d5c536232e8db22e9221bfbfe834ff

  • SHA512

    ca8670e93d84dcd9afe358fc2d862aa746305356909644e4509970b0b098f762a7258f79d826954cb3cd7b531bf8f2d597f59b3d5a1705a10804f83cbfeb2d67

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.wc.21340.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.wc.21340.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3944
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.wc.21340.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.wc.21340.exe"
      2⤵
        PID:1264
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s seclogon
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2888

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1264-3-0x0000000000000000-mapping.dmp
    • memory/3944-1-0x00000000051B0000-0x00000000051B1000-memory.dmp
      Filesize

      4KB

    • memory/3944-2-0x0000000000400000-0x0000000000B10000-memory.dmp
      Filesize

      7.1MB