Analysis

  • max time kernel
    7s
  • max time network
    11s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    03-03-2021 09:38

General

  • Target

    5bb8f73b4527c42b37f157bcda1718f25ceae2c71fcb483292ce68d4633ae2e0.exe

  • Size

    229KB

  • MD5

    bbe2e9a29db536b88b0f6fcd7f1c70d1

  • SHA1

    32766fd8f759d0c04da273d0978bd7c2680c7587

  • SHA256

    5bb8f73b4527c42b37f157bcda1718f25ceae2c71fcb483292ce68d4633ae2e0

  • SHA512

    8b8624b0dda8258048e33194860385d1ba503ff393045869c43236844eb6166d4424dc5a15c5471b7534fb73bc3a1a59f6d134e64b993759a26116ef227f2006

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Modifies system certificate store 2 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bb8f73b4527c42b37f157bcda1718f25ceae2c71fcb483292ce68d4633ae2e0.exe
    "C:\Users\Admin\AppData\Local\Temp\5bb8f73b4527c42b37f157bcda1718f25ceae2c71fcb483292ce68d4633ae2e0.exe"
    1⤵
    • Modifies system certificate store
    PID:1576

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1576-2-0x0000000005490000-0x00000000054A1000-memory.dmp
    Filesize

    68KB

  • memory/1576-3-0x0000000075A41000-0x0000000075A43000-memory.dmp
    Filesize

    8KB

  • memory/1576-4-0x0000000000020000-0x0000000000023000-memory.dmp
    Filesize

    12KB

  • memory/1576-5-0x0000000000400000-0x0000000000407000-memory.dmp
    Filesize

    28KB

  • memory/2028-6-0x000007FEF6780000-0x000007FEF69FA000-memory.dmp
    Filesize

    2.5MB