Analysis

  • max time kernel
    119s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    04-01-2021 02:13

General

  • Target

    cfc91db9240c75b636480e7dfaef4daaa754e787d2ecb32f55d74c5a20c9dfd1.exe

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfc91db9240c75b636480e7dfaef4daaa754e787d2ecb32f55d74c5a20c9dfd1.exe
    "C:\Users\Admin\AppData\Local\Temp\cfc91db9240c75b636480e7dfaef4daaa754e787d2ecb32f55d74c5a20c9dfd1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Local\Temp\is-4E1VM.tmp\cfc91db9240c75b636480e7dfaef4daaa754e787d2ecb32f55d74c5a20c9dfd1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-4E1VM.tmp\cfc91db9240c75b636480e7dfaef4daaa754e787d2ecb32f55d74c5a20c9dfd1.tmp" /SL5="$3015C,5427954,721408,C:\Users\Admin\AppData\Local\Temp\cfc91db9240c75b636480e7dfaef4daaa754e787d2ecb32f55d74c5a20c9dfd1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1072

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-4E1VM.tmp\cfc91db9240c75b636480e7dfaef4daaa754e787d2ecb32f55d74c5a20c9dfd1.tmp
    MD5

    84db4b4205f705da71471dc6ecc061f5

    SHA1

    b90bac8c13a1553d58feef95a2c41c64118b29cf

    SHA256

    647983ebde53e0501ff1af8ef6190dfeea5ccc64caf7dce808f1e3d98fb66a3c

    SHA512

    c5803b63d33bb409433b496b83ca2a7359b4b1835815386206283b3af5c54d7d1cb9e80244a888638c7703c4bf54e1b2c11be6836f20b9fea157ab92bfbf365a

  • \Users\Admin\AppData\Local\Temp\is-4E1VM.tmp\cfc91db9240c75b636480e7dfaef4daaa754e787d2ecb32f55d74c5a20c9dfd1.tmp
    MD5

    84db4b4205f705da71471dc6ecc061f5

    SHA1

    b90bac8c13a1553d58feef95a2c41c64118b29cf

    SHA256

    647983ebde53e0501ff1af8ef6190dfeea5ccc64caf7dce808f1e3d98fb66a3c

    SHA512

    c5803b63d33bb409433b496b83ca2a7359b4b1835815386206283b3af5c54d7d1cb9e80244a888638c7703c4bf54e1b2c11be6836f20b9fea157ab92bfbf365a

  • memory/1072-3-0x0000000000000000-mapping.dmp