Analysis

  • max time kernel
    140s
  • max time network
    9s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    11-05-2021 13:31

General

  • Target

    da.exe

  • Size

    875KB

  • MD5

    9fdf605ce0358540d48502367e637b0a

  • SHA1

    1416ebf9b0382a8794bb89f5ee947ec668ce7fdb

  • SHA256

    df22601db1675ce639bc8efe21534f7371050ae9637f6cdf38bc23ae6c18efdf

  • SHA512

    a194aba3f8c20669ff741ccb59ce7b7023123e1e7984d6d6306a9099d78775ba7bdb92691c26b39522ede6f799f34e96d6b14db1e66429bea26077b95e805bf7

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da.exe
    "C:\Users\Admin\AppData\Local\Temp\da.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Users\Admin\AppData\Local\Temp\da.exe
      "C:\Users\Admin\AppData\Local\Temp\da.exe"
      2⤵
        PID:332
      • C:\Users\Admin\AppData\Local\Temp\da.exe
        "C:\Users\Admin\AppData\Local\Temp\da.exe"
        2⤵
          PID:572
        • C:\Users\Admin\AppData\Local\Temp\da.exe
          "C:\Users\Admin\AppData\Local\Temp\da.exe"
          2⤵
            PID:640
          • C:\Users\Admin\AppData\Local\Temp\da.exe
            "C:\Users\Admin\AppData\Local\Temp\da.exe"
            2⤵
              PID:1764
            • C:\Users\Admin\AppData\Local\Temp\da.exe
              "C:\Users\Admin\AppData\Local\Temp\da.exe"
              2⤵
                PID:796

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/540-59-0x00000000003A0000-0x00000000003A1000-memory.dmp
              Filesize

              4KB

            • memory/540-61-0x0000000004D00000-0x0000000004D01000-memory.dmp
              Filesize

              4KB

            • memory/540-62-0x00000000005C0000-0x00000000005C4000-memory.dmp
              Filesize

              16KB

            • memory/540-63-0x00000000051D0000-0x0000000005294000-memory.dmp
              Filesize

              784KB

            • memory/540-64-0x00000000053D0000-0x0000000005451000-memory.dmp
              Filesize

              516KB