Analysis

  • max time kernel
    116s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    17-04-2021 19:56

General

  • Target

    Items Needed.exe

  • Size

    28KB

  • MD5

    75b25644240fbdecc8e60f097c93a6ef

  • SHA1

    c32bf2a40047abf6b4a144e7a8d6e6d1b45afb88

  • SHA256

    4988d73d2134785c5c09a123189e395d6637112537bc37a25aeb9c0cb6a21973

  • SHA512

    4555d57fad07b178d655ccc9a52fa9bbfd405d82a74f2429b5178de7af201fc81360fcd764ff886b80a03ff78abb0f5ea9e54891fd32e84096dac9ef6b606f37

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Items Needed.exe
    "C:\Users\Admin\AppData\Local\Temp\Items Needed.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 1584
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:1292

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1292-63-0x0000000000000000-mapping.dmp
  • memory/1292-64-0x0000000000310000-0x0000000000311000-memory.dmp
    Filesize

    4KB

  • memory/1748-59-0x0000000001070000-0x0000000001071000-memory.dmp
    Filesize

    4KB

  • memory/1748-61-0x0000000000F10000-0x0000000000F11000-memory.dmp
    Filesize

    4KB

  • memory/1748-62-0x0000000000980000-0x00000000009C8000-memory.dmp
    Filesize

    288KB