Analysis

  • max time kernel
    150s
  • max time network
    40s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    13-05-2021 05:11

General

  • Target

    5137cc19757bb7ca9fbe88ca1606ad6c83856b9635238f5915d1494a098a8ae7.exe

  • Size

    1.9MB

  • MD5

    bc9737888f834cdb1bb6462993fcbe76

  • SHA1

    36147eaa29bb38f1fe4bd027457de7bb851ab29b

  • SHA256

    5137cc19757bb7ca9fbe88ca1606ad6c83856b9635238f5915d1494a098a8ae7

  • SHA512

    12b3d5eef66175dd8e9278aebc362994a490e8e500a40a0b7ec066db6ea2e0a70306e1c01593c281666b34dc5b3fd2454cc831f243e1e997d5ba26c6474eb48c

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5137cc19757bb7ca9fbe88ca1606ad6c83856b9635238f5915d1494a098a8ae7.exe
    "C:\Users\Admin\AppData\Local\Temp\5137cc19757bb7ca9fbe88ca1606ad6c83856b9635238f5915d1494a098a8ae7.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:1612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1612-60-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB