Analysis

  • max time kernel
    141s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-11-2020 07:28

General

  • Target

    eeefbf3fc5eaa2e8a586e76409ca853df354aaee653f6496bafc0f07629ce54d.exe

  • Size

    10.7MB

  • MD5

    cdae3386f5001afec452ec4505e52784

  • SHA1

    70b3526905e5f6a44fe323455142dd12af816e13

  • SHA256

    eeefbf3fc5eaa2e8a586e76409ca853df354aaee653f6496bafc0f07629ce54d

  • SHA512

    24c38f2fb15cfa383f399b9d11e8e95f2b56020a4496aabe2541589f57c57d4c53ecbcb6df3bed916605ed4140c5aeb366f1ae66d171b7e7eae0dba967328117

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eeefbf3fc5eaa2e8a586e76409ca853df354aaee653f6496bafc0f07629ce54d.exe
    "C:\Users\Admin\AppData\Local\Temp\eeefbf3fc5eaa2e8a586e76409ca853df354aaee653f6496bafc0f07629ce54d.exe"
    1⤵
    • Modifies system certificate store
    PID:844

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/844-0-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/844-1-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/844-2-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/844-3-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB