Analysis
-
max time kernel
139s -
max time network
106s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 07:27
Static task
static1
Behavioral task
behavioral1
Sample
New FedEx paper work review.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
New FedEx paper work review.exe
Resource
win10v20201028
General
-
Target
New FedEx paper work review.exe
-
Size
792KB
-
MD5
c359c954a7d104b0a1bde867f86e73a5
-
SHA1
e647c8aa88a7209463b0dd0daa733759a529806d
-
SHA256
306602e7317841b219d25b24ca14f9e50987fe9c9e48b3728bb548dea4557f9d
-
SHA512
8f48d07be0342db4a946b5c74598eb5dbe565bbf0c7ed2a5f6b5ab7b99577f0e8463004f601d0286bcaebf5a673e18e83d9b8f319e5566f28b59e2ebc3a18644
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
New FedEx paper work review.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts New FedEx paper work review.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
New FedEx paper work review.exedescription pid process target process PID 1144 set thread context of 2688 1144 New FedEx paper work review.exe New FedEx paper work review.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
New FedEx paper work review.exepid process 2688 New FedEx paper work review.exe 2688 New FedEx paper work review.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
New FedEx paper work review.exedescription pid process Token: SeDebugPrivilege 2688 New FedEx paper work review.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
New FedEx paper work review.exedescription pid process target process PID 1144 wrote to memory of 2688 1144 New FedEx paper work review.exe New FedEx paper work review.exe PID 1144 wrote to memory of 2688 1144 New FedEx paper work review.exe New FedEx paper work review.exe PID 1144 wrote to memory of 2688 1144 New FedEx paper work review.exe New FedEx paper work review.exe PID 1144 wrote to memory of 2688 1144 New FedEx paper work review.exe New FedEx paper work review.exe PID 1144 wrote to memory of 2688 1144 New FedEx paper work review.exe New FedEx paper work review.exe PID 1144 wrote to memory of 2688 1144 New FedEx paper work review.exe New FedEx paper work review.exe PID 1144 wrote to memory of 2688 1144 New FedEx paper work review.exe New FedEx paper work review.exe PID 1144 wrote to memory of 2688 1144 New FedEx paper work review.exe New FedEx paper work review.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New FedEx paper work review.exe"C:\Users\Admin\AppData\Local\Temp\New FedEx paper work review.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\New FedEx paper work review.exe"C:\Users\Admin\AppData\Local\Temp\New FedEx paper work review.exe"2⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\New FedEx paper work review.exe.logMD5
90acfd72f14a512712b1a7380c0faf60
SHA140ba4accb8faa75887e84fb8e38d598dc8cf0f12
SHA25620806822f0c130b340504132c1461b589261fbbc518e468f4f90733ab514cb86
SHA51229dbf85e14e60868574cb4dc9bda83d3c229fb956733d8d2557f2475ee0e690ac9c2e72f31e02284996da6906ba2dbfa382a29b04c15a2406571d8ee19ad16b9
-
memory/1144-9-0x0000000004ED0000-0x0000000004ED1000-memory.dmpFilesize
4KB
-
memory/1144-11-0x0000000005AC0000-0x0000000005B35000-memory.dmpFilesize
468KB
-
memory/1144-6-0x00000000051C0000-0x00000000051C1000-memory.dmpFilesize
4KB
-
memory/1144-7-0x0000000004D60000-0x0000000004D61000-memory.dmpFilesize
4KB
-
memory/1144-8-0x0000000004BE0000-0x0000000004BE1000-memory.dmpFilesize
4KB
-
memory/1144-2-0x0000000073A80000-0x000000007416E000-memory.dmpFilesize
6.9MB
-
memory/1144-10-0x0000000004D40000-0x0000000004D52000-memory.dmpFilesize
72KB
-
memory/1144-5-0x0000000004C20000-0x0000000004C21000-memory.dmpFilesize
4KB
-
memory/1144-3-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/2688-13-0x000000000043772E-mapping.dmp
-
memory/2688-12-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2688-15-0x0000000073A80000-0x000000007416E000-memory.dmpFilesize
6.9MB
-
memory/2688-20-0x0000000005CC0000-0x0000000005CC1000-memory.dmpFilesize
4KB
-
memory/2688-21-0x0000000006570000-0x0000000006571000-memory.dmpFilesize
4KB