Resubmissions

12/11/2021, 18:04 UTC

211112-wnzb8aahhm 10

19/11/2020, 10:08 UTC

201119-rhwlt38jrx 10

18/11/2020, 17:26 UTC

201118-htd4fq29va 10

Analysis

  • max time kernel
    319s
  • max time network
    394s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18/11/2020, 17:26 UTC

General

  • Target

    CVWSHSetup[1].bin/WSHSetup[1].exe

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CVWSHSetup[1].bin\WSHSetup[1].exe
    "C:\Users\Admin\AppData\Local\Temp\CVWSHSetup[1].bin\WSHSetup[1].exe"
    1⤵
    • Drops file in Windows directory
    PID:4728
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 1568
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4168

Network

  • flag-unknown
    DNS
    trynda.xyz
    Remote address:
    8.8.8.8:53
    Request
    trynda.xyz
    IN A
    Response
  • flag-unknown
    DNS
    trynda.xyz
    Remote address:
    8.8.8.8:53
    Request
    trynda.xyz
    IN A
    Response
No results found
  • 8.8.8.8:53
    trynda.xyz
    dns
    56 B
    121 B
    1
    1

    DNS Request

    trynda.xyz

  • 8.8.8.8:53
    trynda.xyz
    dns
    56 B
    121 B
    1
    1

    DNS Request

    trynda.xyz

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4168-0-0x0000000005000000-0x0000000005001000-memory.dmp

    Filesize

    4KB

  • memory/4168-1-0x0000000005830000-0x0000000005831000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.