Resubmissions

17-12-2020 08:38

201217-qvcs4jyy9j 9

16-12-2020 21:43

201216-t8px7jr1q2 9

Analysis

  • max time kernel
    17s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    16-12-2020 21:43

General

  • Target

    SecuriteInfo.com.Mal.EncPk-APV.26203.27624.dll

  • Size

    2.2MB

  • MD5

    956b50fb7963b465a2fda42c34efdf0e

  • SHA1

    1741aeb38a3fdd9c5645f60e27fcd8bff2396bbb

  • SHA256

    7a745309ede442df8b60129c159928f87d52ed151f53266a217e721cf2d6012a

  • SHA512

    eab8eb5a1066b48c085107ba0863a73008c7f7ddbf171fd684ef2f32ca1a495ac48c3bc62462811b6830fbe18472ebf971b6f3f8428eb659ec19dba353a7cc4d

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Mal.EncPk-APV.26203.27624.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Mal.EncPk-APV.26203.27624.dll,#1
      2⤵
        PID:3304
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 624
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2712

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2712-6-0x0000000005030000-0x0000000005031000-memory.dmp
      Filesize

      4KB

    • memory/2712-10-0x00000000059C0000-0x00000000059C1000-memory.dmp
      Filesize

      4KB

    • memory/3304-2-0x0000000000000000-mapping.dmp
    • memory/3304-7-0x0000000000000000-mapping.dmp
    • memory/3304-8-0x0000000000000000-mapping.dmp
    • memory/3304-9-0x0000000000000000-mapping.dmp
    • memory/3304-11-0x0000000000000000-mapping.dmp
    • memory/3304-12-0x0000000000000000-mapping.dmp
    • memory/3304-13-0x00000000009B0000-0x00000000009B1000-memory.dmp
      Filesize

      4KB