Analysis
-
max time kernel
65s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
20-01-2021 06:25
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
file.exe
-
Size
1.1MB
-
MD5
37d67bd746d37724222ec6c8f61d1a02
-
SHA1
ef202fb219bb84b2d860821a1ff213c4722fd90d
-
SHA256
523190f1fd2e4a7be94f790ae040a3375460123f371077f20864aec61ea016f6
-
SHA512
d5c571a1ec6ab63f8da91250e66bbc7cc6ae382e456a7f88f8a81ec711dae32333a30e653e8f613f1f6c3e0e67ec671a79ff066dc7e4034751eadabe3d416e2d
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
file.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\Temp\\file.exe\"" file.exe -
Drops startup file 2 IoCs
Processes:
file.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe file.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\file.exe file.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
file.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\<Unknown> = "C:\\Users\\Admin\\AppData\\Local\\Temp\\file.exe" file.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\file.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\file.exe" file.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/424-2-0x0000000073D50000-0x000000007443E000-memory.dmpFilesize
6.9MB
-
memory/424-3-0x0000000000040000-0x0000000000041000-memory.dmpFilesize
4KB
-
memory/424-5-0x0000000004940000-0x0000000004941000-memory.dmpFilesize
4KB
-
memory/424-6-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/424-7-0x0000000004B00000-0x0000000004B2B000-memory.dmpFilesize
172KB
-
memory/424-8-0x0000000004CA0000-0x0000000004CA1000-memory.dmpFilesize
4KB