Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    16-04-2021 17:17

General

  • Target

    Nuevo documento de confirmación de solicitud..exe

  • Size

    812KB

  • MD5

    ca9350da27b53b25146a0d8b6913b06c

  • SHA1

    f54b3cb317ac7410ea510839718484595534f533

  • SHA256

    d509a1aac6989c651953416b29ee6c949eba0be53df193b29e2e95e5b9e4635e

  • SHA512

    9e5724f58bc1da17358903d4a3d7436881dba63f430ce2b4b7e015709473e48552fde778efe2b0e1ee9877d0e1d2f311855961bd6c100ed1f2683240f87b94f7

Score
8/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nuevo documento de confirmación de solicitud..exe
    "C:\Users\Admin\AppData\Local\Temp\Nuevo documento de confirmación de solicitud..exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Windows\SysWOW64\mobsync.exe
      C:\Windows\System32\mobsync.exe
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2128-119-0x0000000000000000-mapping.dmp

  • memory/2128-121-0x0000000002910000-0x0000000002911000-memory.dmp

    Filesize

    4KB

  • memory/2128-120-0x0000000002850000-0x0000000002851000-memory.dmp

    Filesize

    4KB

  • memory/2128-126-0x0000000010410000-0x00000000107F4000-memory.dmp

    Filesize

    3.9MB

  • memory/2128-125-0x0000000002970000-0x0000000002971000-memory.dmp

    Filesize

    4KB

  • memory/3904-114-0x00000000004E0000-0x00000000004E1000-memory.dmp

    Filesize

    4KB

  • memory/3904-116-0x0000000002760000-0x000000000277A000-memory.dmp

    Filesize

    104KB