Analysis

  • max time kernel
    49s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    10-11-2020 06:43

General

  • Target

    e9c6d2d13d4077f329cb0fcd76ae32c9b8e64097c5efdbf6b96fef955d7e4131.exe

  • Size

    10.6MB

  • MD5

    7168e82c6a8af9274b7151131c39b04c

  • SHA1

    fd0e38ce9b2154bb8a44c01dbb753adc3bb36c64

  • SHA256

    e9c6d2d13d4077f329cb0fcd76ae32c9b8e64097c5efdbf6b96fef955d7e4131

  • SHA512

    3fdd8a1e2ba37a1f8ac68d00a3b6cc8063ce2e4ea120317e850454faa72fe92d6b96fe063547c91a344796d60df1f6d98670c231151c5f82482406c7e3637133

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops autorun.inf file 1 TTPs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 12 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9c6d2d13d4077f329cb0fcd76ae32c9b8e64097c5efdbf6b96fef955d7e4131.exe
    "C:\Users\Admin\AppData\Local\Temp\e9c6d2d13d4077f329cb0fcd76ae32c9b8e64097c5efdbf6b96fef955d7e4131.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/816-0-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB

  • memory/816-1-0x0000000000400000-0x00000000010B2000-memory.dmp

    Filesize

    12.7MB

  • memory/816-4-0x0000000000180000-0x0000000000190000-memory.dmp

    Filesize

    64KB

  • memory/816-5-0x0000000000190000-0x0000000000192000-memory.dmp

    Filesize

    8KB

  • memory/816-6-0x00000000001A0000-0x00000000001E0000-memory.dmp

    Filesize

    256KB

  • memory/816-7-0x00000000001E0000-0x00000000001F0000-memory.dmp

    Filesize

    64KB

  • memory/816-8-0x00000000001F0000-0x0000000000200000-memory.dmp

    Filesize

    64KB