Analysis

  • max time kernel
    16s
  • max time network
    10s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    27-11-2020 11:07

General

  • Target

    83ce49568eda2b4a7f66888463e3bbc0f6dcc1123718fb5f1a9be8e13a3c11ce.exe

  • Size

    618KB

  • MD5

    fd271d9e9226304745461177b444fdbc

  • SHA1

    b86892f176e96f68346578cd48ba284881a76471

  • SHA256

    83ce49568eda2b4a7f66888463e3bbc0f6dcc1123718fb5f1a9be8e13a3c11ce

  • SHA512

    f8224d2b54daff4b93e91256430bfc3356c8e7a76c918a953f6332125d0c84d85612991110a067bd373f1856dc8e10a30ab0ff3283c59951ecf16e00ddd09895

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83ce49568eda2b4a7f66888463e3bbc0f6dcc1123718fb5f1a9be8e13a3c11ce.exe
    "C:\Users\Admin\AppData\Local\Temp\83ce49568eda2b4a7f66888463e3bbc0f6dcc1123718fb5f1a9be8e13a3c11ce.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:648
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Users\Admin\AppData\Local\Temp\83ce49568eda2b4a7f66888463e3bbc0f6dcc1123718fb5f1a9be8e13a3c11ce.exe"
      2⤵
        PID:1604
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}
      1⤵
      • Drops startup file
      PID:1412

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads