Analysis

  • max time kernel
    5s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-11-2020 07:01

General

  • Target

    d1cc10291920bd8b81b958289b991a59de6e9e94dd4ef727ee5dd70842c8757a.exe

  • Size

    10.7MB

  • MD5

    07b1807952b47a8f9c58f9e8d4f59b23

  • SHA1

    26010b7b15d70c7b68a197d22d6b4688920b8e8c

  • SHA256

    d1cc10291920bd8b81b958289b991a59de6e9e94dd4ef727ee5dd70842c8757a

  • SHA512

    e6676b8bf152eeb9958306f705bd067b2707e8fb6308fb302e746262987a071743244ad684dd478be0550f6f01f6999dcbe69402143fd312293896eae0543af6

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1cc10291920bd8b81b958289b991a59de6e9e94dd4ef727ee5dd70842c8757a.exe
    "C:\Users\Admin\AppData\Local\Temp\d1cc10291920bd8b81b958289b991a59de6e9e94dd4ef727ee5dd70842c8757a.exe"
    1⤵
    • Modifies system certificate store
    PID:2028

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2028-0-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2028-1-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2028-2-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB

  • memory/2028-3-0x0000000000400000-0x00000000010B2000-memory.dmp
    Filesize

    12.7MB