Analysis

  • max time kernel
    45s
  • max time network
    68s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    05-12-2020 02:49

General

  • Target

    ACVi5thpc2g7rav.exe

  • Size

    823KB

  • MD5

    38c36c621e2d3240a43e2065662d0b44

  • SHA1

    a90cf88c2ac557d01417465a3821443e58efa6f3

  • SHA256

    470ec39d83b15dbacbd1a3ead063329afc46a116e41b200cade7d8ee505adb70

  • SHA512

    9caa88a9fe37b2f3b262b821b603d72ed65f80734399f60a6f94d8153d2439d04fc6b31011359493741ba88c350db63d3f50cfe5948392d7b44d67cff8240e02

Score
1/10

Malware Config

Signatures

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ACVi5thpc2g7rav.exe
    "C:\Users\Admin\AppData\Local\Temp\ACVi5thpc2g7rav.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3888
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nInrwPNXrHrlqB" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDCE8.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3184

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpDCE8.tmp
    MD5

    b623c3ac4ffeeb032558a18a5e876bdd

    SHA1

    400feb49bbb4a36a865409ae0c35a861db275837

    SHA256

    b063cc11f1038e9350132f8a3f0288198796f641608ef8690b8d7b50d6ec1087

    SHA512

    2b9a8132faf802302c043e7207883123c1372409239b96baf6a0c54f40b7a571c0c72b785424e1d904fae47931da134300d1bcad1f6e0ff47257f6770b457b98

  • memory/3184-12-0x0000000000000000-mapping.dmp
  • memory/3888-2-0x0000000073A20000-0x000000007410E000-memory.dmp
    Filesize

    6.9MB

  • memory/3888-3-0x0000000000BB0000-0x0000000000BB1000-memory.dmp
    Filesize

    4KB

  • memory/3888-5-0x00000000059D0000-0x00000000059D1000-memory.dmp
    Filesize

    4KB

  • memory/3888-6-0x0000000005570000-0x0000000005571000-memory.dmp
    Filesize

    4KB

  • memory/3888-7-0x0000000003060000-0x0000000003061000-memory.dmp
    Filesize

    4KB

  • memory/3888-8-0x0000000006400000-0x0000000006401000-memory.dmp
    Filesize

    4KB

  • memory/3888-9-0x0000000005770000-0x0000000005771000-memory.dmp
    Filesize

    4KB

  • memory/3888-10-0x0000000005740000-0x000000000574E000-memory.dmp
    Filesize

    56KB

  • memory/3888-11-0x0000000006BB0000-0x0000000006C8E000-memory.dmp
    Filesize

    888KB

  • memory/3888-14-0x0000000006DA0000-0x0000000006E01000-memory.dmp
    Filesize

    388KB