Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-11-2020 07:01

General

  • Target

    42512b84f2e77473474490514a8d8f6b9cf3c01a80442a6ed7a1fb95d10b81ad.exe

  • Size

    10.7MB

  • MD5

    a43575ea026bfd5674cbecb2fe766a97

  • SHA1

    566c0b3472dd7fb6068f1b57f4827bb5509661be

  • SHA256

    42512b84f2e77473474490514a8d8f6b9cf3c01a80442a6ed7a1fb95d10b81ad

  • SHA512

    5730deeca1ac53b79c2255c4982776f53f6710784b086d1399c393802e467085e7c46fb5ebb34aba505a951356e9dd9c0569139151108001535fdbbf9994e2e1

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42512b84f2e77473474490514a8d8f6b9cf3c01a80442a6ed7a1fb95d10b81ad.exe
    "C:\Users\Admin\AppData\Local\Temp\42512b84f2e77473474490514a8d8f6b9cf3c01a80442a6ed7a1fb95d10b81ad.exe"
    1⤵
    • Modifies system certificate store
    PID:1424

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1424-0-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/1424-1-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/1424-2-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/1424-3-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB